May 10 00:44:23.930347 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:44:23.930369 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:23.930379 kernel: BIOS-provided physical RAM map: May 10 00:44:23.930385 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:44:23.930408 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:44:23.930414 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:44:23.930420 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:44:23.930426 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:44:23.930432 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:44:23.930439 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:44:23.930444 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 10 00:44:23.930450 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:44:23.930456 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:44:23.930461 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:44:23.930468 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:44:23.930476 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:44:23.930482 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:44:23.930488 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:44:23.930497 kernel: NX (Execute Disable) protection: active May 10 00:44:23.930503 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:44:23.930509 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:44:23.930515 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:44:23.930521 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:44:23.930526 kernel: extended physical RAM map: May 10 00:44:23.930532 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:44:23.930539 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:44:23.930545 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:44:23.930551 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:44:23.930557 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:44:23.930563 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:44:23.930569 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:44:23.930575 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 10 00:44:23.930581 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 10 00:44:23.930587 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 10 00:44:23.930593 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 10 00:44:23.930599 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 10 00:44:23.930606 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:44:23.930612 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:44:23.930618 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:44:23.930624 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:44:23.930633 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:44:23.930640 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:44:23.930646 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:44:23.930654 kernel: efi: EFI v2.70 by EDK II May 10 00:44:23.930660 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 10 00:44:23.930667 kernel: random: crng init done May 10 00:44:23.930673 kernel: SMBIOS 2.8 present. May 10 00:44:23.930680 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 10 00:44:23.930686 kernel: Hypervisor detected: KVM May 10 00:44:23.930692 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:44:23.930699 kernel: kvm-clock: cpu 0, msr 2d196001, primary cpu clock May 10 00:44:23.930718 kernel: kvm-clock: using sched offset of 5665586471 cycles May 10 00:44:23.930731 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:44:23.930738 kernel: tsc: Detected 2794.748 MHz processor May 10 00:44:23.930758 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:44:23.930765 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:44:23.930772 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 10 00:44:23.930779 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:44:23.930785 kernel: Using GB pages for direct mapping May 10 00:44:23.930792 kernel: Secure boot disabled May 10 00:44:23.930798 kernel: ACPI: Early table checksum verification disabled May 10 00:44:23.930806 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 10 00:44:23.930813 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 10 00:44:23.930822 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:23.930831 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:23.930843 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 10 00:44:23.930852 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:23.930860 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:23.930872 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:23.930879 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:44:23.930887 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 10 00:44:23.930894 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 10 00:44:23.930900 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 10 00:44:23.930907 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 10 00:44:23.930914 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 10 00:44:23.930920 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 10 00:44:23.930927 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 10 00:44:23.930933 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 10 00:44:23.930940 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 10 00:44:23.930948 kernel: No NUMA configuration found May 10 00:44:23.930984 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 10 00:44:23.930991 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 10 00:44:23.930998 kernel: Zone ranges: May 10 00:44:23.931005 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:44:23.931011 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 10 00:44:23.931017 kernel: Normal empty May 10 00:44:23.931024 kernel: Movable zone start for each node May 10 00:44:23.931031 kernel: Early memory node ranges May 10 00:44:23.931039 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:44:23.931045 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 10 00:44:23.931052 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 10 00:44:23.931058 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 10 00:44:23.931065 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 10 00:44:23.931071 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 10 00:44:23.931078 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 10 00:44:23.931084 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:44:23.931091 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:44:23.931097 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 10 00:44:23.931105 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:44:23.931112 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 10 00:44:23.931119 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:44:23.931125 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 10 00:44:23.931132 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:44:23.931138 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:44:23.931145 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:44:23.931152 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:44:23.931160 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:44:23.931171 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:44:23.931179 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:44:23.931188 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:44:23.931199 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:44:23.931207 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:44:23.931214 kernel: TSC deadline timer available May 10 00:44:23.931221 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 10 00:44:23.931227 kernel: kvm-guest: KVM setup pv remote TLB flush May 10 00:44:23.931234 kernel: kvm-guest: setup PV sched yield May 10 00:44:23.931242 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 10 00:44:23.931249 kernel: Booting paravirtualized kernel on KVM May 10 00:44:23.931266 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:44:23.931277 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 10 00:44:23.931284 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 10 00:44:23.931291 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 10 00:44:23.931297 kernel: pcpu-alloc: [0] 0 1 2 3 May 10 00:44:23.931304 kernel: kvm-guest: setup async PF for cpu 0 May 10 00:44:23.931311 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 10 00:44:23.931318 kernel: kvm-guest: PV spinlocks enabled May 10 00:44:23.931325 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:44:23.931332 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 10 00:44:23.931343 kernel: Policy zone: DMA32 May 10 00:44:23.931351 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:23.931358 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:44:23.931365 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:44:23.931376 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:44:23.931383 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:44:23.931391 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 10 00:44:23.931398 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 10 00:44:23.931405 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:44:23.931412 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:44:23.931418 kernel: rcu: Hierarchical RCU implementation. May 10 00:44:23.931426 kernel: rcu: RCU event tracing is enabled. May 10 00:44:23.931433 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 10 00:44:23.931444 kernel: Rude variant of Tasks RCU enabled. May 10 00:44:23.931451 kernel: Tracing variant of Tasks RCU enabled. May 10 00:44:23.931458 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:44:23.931465 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 10 00:44:23.931472 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 10 00:44:23.931479 kernel: Console: colour dummy device 80x25 May 10 00:44:23.931486 kernel: printk: console [ttyS0] enabled May 10 00:44:23.931493 kernel: ACPI: Core revision 20210730 May 10 00:44:23.931500 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:44:23.931511 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:44:23.931518 kernel: x2apic enabled May 10 00:44:23.931525 kernel: Switched APIC routing to physical x2apic. May 10 00:44:23.931532 kernel: kvm-guest: setup PV IPIs May 10 00:44:23.931539 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:44:23.931546 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 00:44:23.931553 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 10 00:44:23.931560 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 00:44:23.931569 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 10 00:44:23.931580 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 10 00:44:23.931587 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:44:23.931594 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:44:23.931601 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:44:23.931608 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 10 00:44:23.931615 kernel: RETBleed: Mitigation: untrained return thunk May 10 00:44:23.931622 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:44:23.931631 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:44:23.931638 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:44:23.931649 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:44:23.931657 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:44:23.931663 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:44:23.931670 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:44:23.931677 kernel: Freeing SMP alternatives memory: 32K May 10 00:44:23.931684 kernel: pid_max: default: 32768 minimum: 301 May 10 00:44:23.931691 kernel: LSM: Security Framework initializing May 10 00:44:23.931698 kernel: SELinux: Initializing. May 10 00:44:23.931716 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:44:23.931728 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:44:23.931735 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 10 00:44:23.931742 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 10 00:44:23.931749 kernel: ... version: 0 May 10 00:44:23.931756 kernel: ... bit width: 48 May 10 00:44:23.931763 kernel: ... generic registers: 6 May 10 00:44:23.931771 kernel: ... value mask: 0000ffffffffffff May 10 00:44:23.931780 kernel: ... max period: 00007fffffffffff May 10 00:44:23.931793 kernel: ... fixed-purpose events: 0 May 10 00:44:23.931813 kernel: ... event mask: 000000000000003f May 10 00:44:23.931822 kernel: signal: max sigframe size: 1776 May 10 00:44:23.931829 kernel: rcu: Hierarchical SRCU implementation. May 10 00:44:23.931836 kernel: smp: Bringing up secondary CPUs ... May 10 00:44:23.931843 kernel: x86: Booting SMP configuration: May 10 00:44:23.931849 kernel: .... node #0, CPUs: #1 May 10 00:44:23.931856 kernel: kvm-clock: cpu 1, msr 2d196041, secondary cpu clock May 10 00:44:23.931863 kernel: kvm-guest: setup async PF for cpu 1 May 10 00:44:23.931870 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 10 00:44:23.931881 kernel: #2 May 10 00:44:23.931888 kernel: kvm-clock: cpu 2, msr 2d196081, secondary cpu clock May 10 00:44:23.931895 kernel: kvm-guest: setup async PF for cpu 2 May 10 00:44:23.931902 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 10 00:44:23.931911 kernel: #3 May 10 00:44:23.931920 kernel: kvm-clock: cpu 3, msr 2d1960c1, secondary cpu clock May 10 00:44:23.931933 kernel: kvm-guest: setup async PF for cpu 3 May 10 00:44:23.931945 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 10 00:44:23.931963 kernel: smp: Brought up 1 node, 4 CPUs May 10 00:44:23.931983 kernel: smpboot: Max logical packages: 1 May 10 00:44:23.931993 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 10 00:44:23.932001 kernel: devtmpfs: initialized May 10 00:44:23.932011 kernel: x86/mm: Memory block size: 128MB May 10 00:44:23.932020 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 10 00:44:23.932029 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 10 00:44:23.932036 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 10 00:44:23.932043 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 10 00:44:23.932050 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 10 00:44:23.932062 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:44:23.932069 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 10 00:44:23.932076 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:44:23.932083 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:44:23.932090 kernel: audit: initializing netlink subsys (disabled) May 10 00:44:23.932097 kernel: audit: type=2000 audit(1746837863.333:1): state=initialized audit_enabled=0 res=1 May 10 00:44:23.932103 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:44:23.932110 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:44:23.932117 kernel: cpuidle: using governor menu May 10 00:44:23.932128 kernel: ACPI: bus type PCI registered May 10 00:44:23.932135 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:44:23.932142 kernel: dca service started, version 1.12.1 May 10 00:44:23.932149 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 00:44:23.932156 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 00:44:23.932163 kernel: PCI: Using configuration type 1 for base access May 10 00:44:23.932170 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:44:23.932177 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:44:23.932184 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:44:23.932194 kernel: ACPI: Added _OSI(Module Device) May 10 00:44:23.932201 kernel: ACPI: Added _OSI(Processor Device) May 10 00:44:23.932208 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:44:23.932215 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:44:23.932222 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:44:23.932229 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:44:23.932238 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:44:23.932254 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:44:23.932263 kernel: ACPI: Interpreter enabled May 10 00:44:23.932281 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:44:23.932290 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:44:23.932297 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:44:23.932304 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 00:44:23.932311 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:44:23.932467 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:44:23.932546 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 10 00:44:23.932658 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 10 00:44:23.932680 kernel: PCI host bridge to bus 0000:00 May 10 00:44:23.932786 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:44:23.932860 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:44:23.932927 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:44:23.933002 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 10 00:44:23.933070 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:44:23.933157 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 10 00:44:23.933238 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:44:23.933368 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 00:44:23.933499 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 10 00:44:23.933615 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 10 00:44:23.933718 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 10 00:44:23.933832 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:44:23.934030 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 10 00:44:23.934113 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:44:23.934213 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:44:23.934295 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 10 00:44:23.934369 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 10 00:44:23.934445 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 10 00:44:23.934564 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 10 00:44:23.934654 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 10 00:44:23.934756 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 10 00:44:23.934831 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 10 00:44:23.934949 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:44:23.935066 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 10 00:44:23.935165 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 10 00:44:23.935266 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 10 00:44:23.935384 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 10 00:44:23.935530 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 00:44:23.935641 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 00:44:23.935773 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 00:44:23.935870 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 10 00:44:23.935986 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 10 00:44:23.936125 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 00:44:23.936239 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 10 00:44:23.936253 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:44:23.936263 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:44:23.936272 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:44:23.936281 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:44:23.936290 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 00:44:23.936300 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 00:44:23.936318 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 00:44:23.936327 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 00:44:23.936336 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 00:44:23.936345 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 00:44:23.936355 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 00:44:23.936364 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 00:44:23.936373 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 00:44:23.936382 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 00:44:23.936392 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 00:44:23.936406 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 00:44:23.936416 kernel: iommu: Default domain type: Translated May 10 00:44:23.936425 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:44:23.936530 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 00:44:23.936631 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:44:23.936749 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 00:44:23.936763 kernel: vgaarb: loaded May 10 00:44:23.936773 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:44:23.936782 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:44:23.936800 kernel: PTP clock support registered May 10 00:44:23.936810 kernel: Registered efivars operations May 10 00:44:23.936819 kernel: PCI: Using ACPI for IRQ routing May 10 00:44:23.936828 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:44:23.936837 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 10 00:44:23.936847 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 10 00:44:23.936856 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 10 00:44:23.936865 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 10 00:44:23.936874 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 10 00:44:23.936891 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 10 00:44:23.936900 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:44:23.936910 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:44:23.936919 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:44:23.936929 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:44:23.936939 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:44:23.936948 kernel: pnp: PnP ACPI init May 10 00:44:23.937109 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 00:44:23.937133 kernel: pnp: PnP ACPI: found 6 devices May 10 00:44:23.937143 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:44:23.937153 kernel: NET: Registered PF_INET protocol family May 10 00:44:23.937162 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:44:23.937171 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 00:44:23.937181 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:44:23.937190 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:44:23.937200 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 00:44:23.937210 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 00:44:23.937227 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:44:23.937237 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:44:23.937247 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:44:23.937256 kernel: NET: Registered PF_XDP protocol family May 10 00:44:23.937380 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 10 00:44:23.937501 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 10 00:44:23.937606 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:44:23.937701 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:44:23.937848 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:44:23.937948 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 10 00:44:23.938057 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 00:44:23.938151 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 10 00:44:23.938164 kernel: PCI: CLS 0 bytes, default 64 May 10 00:44:23.938175 kernel: Initialise system trusted keyrings May 10 00:44:23.938185 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 00:44:23.938195 kernel: Key type asymmetric registered May 10 00:44:23.938214 kernel: Asymmetric key parser 'x509' registered May 10 00:44:23.938224 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:44:23.938235 kernel: io scheduler mq-deadline registered May 10 00:44:23.938275 kernel: io scheduler kyber registered May 10 00:44:23.938290 kernel: io scheduler bfq registered May 10 00:44:23.938300 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:44:23.938311 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 00:44:23.938322 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 00:44:23.938333 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 00:44:23.938343 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:44:23.938358 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:44:23.938369 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:44:23.938384 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:44:23.938395 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:44:23.938516 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 00:44:23.938533 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:44:23.938627 kernel: rtc_cmos 00:04: registered as rtc0 May 10 00:44:23.938752 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T00:44:23 UTC (1746837863) May 10 00:44:23.938871 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 10 00:44:23.938886 kernel: efifb: probing for efifb May 10 00:44:23.938897 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 10 00:44:23.938908 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 10 00:44:23.938918 kernel: efifb: scrolling: redraw May 10 00:44:23.938928 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:44:23.938939 kernel: Console: switching to colour frame buffer device 160x50 May 10 00:44:23.938949 kernel: fb0: EFI VGA frame buffer device May 10 00:44:23.938977 kernel: pstore: Registered efi as persistent store backend May 10 00:44:23.938987 kernel: NET: Registered PF_INET6 protocol family May 10 00:44:23.938998 kernel: Segment Routing with IPv6 May 10 00:44:23.939009 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:44:23.939025 kernel: NET: Registered PF_PACKET protocol family May 10 00:44:23.939035 kernel: Key type dns_resolver registered May 10 00:44:23.939050 kernel: IPI shorthand broadcast: enabled May 10 00:44:23.939061 kernel: sched_clock: Marking stable (469119866, 132303797)->(668233224, -66809561) May 10 00:44:23.939071 kernel: registered taskstats version 1 May 10 00:44:23.939082 kernel: Loading compiled-in X.509 certificates May 10 00:44:23.939092 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:44:23.939103 kernel: Key type .fscrypt registered May 10 00:44:23.939113 kernel: Key type fscrypt-provisioning registered May 10 00:44:23.939124 kernel: pstore: Using crash dump compression: deflate May 10 00:44:23.939134 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:44:23.939151 kernel: ima: Allocated hash algorithm: sha1 May 10 00:44:23.939162 kernel: ima: No architecture policies found May 10 00:44:23.939172 kernel: clk: Disabling unused clocks May 10 00:44:23.939182 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:44:23.939193 kernel: Write protecting the kernel read-only data: 28672k May 10 00:44:23.939203 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:44:23.939214 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:44:23.939224 kernel: Run /init as init process May 10 00:44:23.939235 kernel: with arguments: May 10 00:44:23.939252 kernel: /init May 10 00:44:23.939263 kernel: with environment: May 10 00:44:23.939273 kernel: HOME=/ May 10 00:44:23.939283 kernel: TERM=linux May 10 00:44:23.939293 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:44:23.939307 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:23.939320 systemd[1]: Detected virtualization kvm. May 10 00:44:23.939332 systemd[1]: Detected architecture x86-64. May 10 00:44:23.939350 systemd[1]: Running in initrd. May 10 00:44:23.939361 systemd[1]: No hostname configured, using default hostname. May 10 00:44:23.939371 systemd[1]: Hostname set to . May 10 00:44:23.939383 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:23.939394 systemd[1]: Queued start job for default target initrd.target. May 10 00:44:23.939405 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:23.939415 systemd[1]: Reached target cryptsetup.target. May 10 00:44:23.939426 systemd[1]: Reached target paths.target. May 10 00:44:23.939444 systemd[1]: Reached target slices.target. May 10 00:44:23.939454 systemd[1]: Reached target swap.target. May 10 00:44:23.939465 systemd[1]: Reached target timers.target. May 10 00:44:23.939477 systemd[1]: Listening on iscsid.socket. May 10 00:44:23.939488 systemd[1]: Listening on iscsiuio.socket. May 10 00:44:23.939498 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:44:23.939509 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:44:23.939519 systemd[1]: Listening on systemd-journald.socket. May 10 00:44:23.939536 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:23.939546 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:23.939557 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:23.939568 systemd[1]: Reached target sockets.target. May 10 00:44:23.939579 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:23.939595 systemd[1]: Finished network-cleanup.service. May 10 00:44:23.939606 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:44:23.939617 systemd[1]: Starting systemd-journald.service... May 10 00:44:23.939628 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:23.939644 systemd[1]: Starting systemd-resolved.service... May 10 00:44:23.939655 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:44:23.939666 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:23.939678 kernel: audit: type=1130 audit(1746837863.933:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.939689 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:44:23.939701 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:44:23.939758 kernel: audit: type=1130 audit(1746837863.937:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.939773 systemd-journald[198]: Journal started May 10 00:44:23.939839 systemd-journald[198]: Runtime Journal (/run/log/journal/2b44d4dbed6e4fa9a9930221e8d6dc20) is 6.0M, max 48.4M, 42.4M free. May 10 00:44:23.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.947824 kernel: audit: type=1130 audit(1746837863.942:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.947859 systemd[1]: Started systemd-journald.service. May 10 00:44:23.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.949905 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:44:23.955073 kernel: audit: type=1130 audit(1746837863.947:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.954270 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:44:23.955660 systemd-modules-load[199]: Inserted module 'overlay' May 10 00:44:23.961302 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:44:23.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.965659 systemd-resolved[200]: Positive Trust Anchors: May 10 00:44:23.965868 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:23.965920 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:23.967086 kernel: audit: type=1130 audit(1746837863.960:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.967288 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:44:23.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.968189 systemd-resolved[200]: Defaulting to hostname 'linux'. May 10 00:44:23.973490 kernel: audit: type=1130 audit(1746837863.967:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.969051 systemd[1]: Starting dracut-cmdline.service... May 10 00:44:23.972133 systemd[1]: Started systemd-resolved.service. May 10 00:44:23.974097 systemd[1]: Reached target nss-lookup.target. May 10 00:44:23.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.980751 kernel: audit: type=1130 audit(1746837863.973:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:23.985981 dracut-cmdline[215]: dracut-dracut-053 May 10 00:44:23.988467 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:24.000743 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:44:24.006455 systemd-modules-load[199]: Inserted module 'br_netfilter' May 10 00:44:24.007637 kernel: Bridge firewalling registered May 10 00:44:24.024744 kernel: SCSI subsystem initialized May 10 00:44:24.037746 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:44:24.037803 kernel: device-mapper: uevent: version 1.0.3 May 10 00:44:24.037817 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:44:24.042630 systemd-modules-load[199]: Inserted module 'dm_multipath' May 10 00:44:24.044677 kernel: Loading iSCSI transport class v2.0-870. May 10 00:44:24.043479 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:24.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.045718 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:24.050526 kernel: audit: type=1130 audit(1746837864.043:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.052331 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:24.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.061729 kernel: audit: type=1130 audit(1746837864.053:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.067743 kernel: iscsi: registered transport (tcp) May 10 00:44:24.090289 kernel: iscsi: registered transport (qla4xxx) May 10 00:44:24.090374 kernel: QLogic iSCSI HBA Driver May 10 00:44:24.124003 systemd[1]: Finished dracut-cmdline.service. May 10 00:44:24.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.125431 systemd[1]: Starting dracut-pre-udev.service... May 10 00:44:24.171738 kernel: raid6: avx2x4 gen() 30457 MB/s May 10 00:44:24.188732 kernel: raid6: avx2x4 xor() 8029 MB/s May 10 00:44:24.205733 kernel: raid6: avx2x2 gen() 32336 MB/s May 10 00:44:24.222732 kernel: raid6: avx2x2 xor() 19119 MB/s May 10 00:44:24.239729 kernel: raid6: avx2x1 gen() 26373 MB/s May 10 00:44:24.256727 kernel: raid6: avx2x1 xor() 15225 MB/s May 10 00:44:24.273727 kernel: raid6: sse2x4 gen() 14674 MB/s May 10 00:44:24.290728 kernel: raid6: sse2x4 xor() 7560 MB/s May 10 00:44:24.307730 kernel: raid6: sse2x2 gen() 16287 MB/s May 10 00:44:24.324725 kernel: raid6: sse2x2 xor() 9785 MB/s May 10 00:44:24.341727 kernel: raid6: sse2x1 gen() 11838 MB/s May 10 00:44:24.359121 kernel: raid6: sse2x1 xor() 7754 MB/s May 10 00:44:24.359134 kernel: raid6: using algorithm avx2x2 gen() 32336 MB/s May 10 00:44:24.359143 kernel: raid6: .... xor() 19119 MB/s, rmw enabled May 10 00:44:24.359839 kernel: raid6: using avx2x2 recovery algorithm May 10 00:44:24.371737 kernel: xor: automatically using best checksumming function avx May 10 00:44:24.464751 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:44:24.474012 systemd[1]: Finished dracut-pre-udev.service. May 10 00:44:24.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.474000 audit: BPF prog-id=7 op=LOAD May 10 00:44:24.475000 audit: BPF prog-id=8 op=LOAD May 10 00:44:24.476445 systemd[1]: Starting systemd-udevd.service... May 10 00:44:24.490153 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 10 00:44:24.495170 systemd[1]: Started systemd-udevd.service. May 10 00:44:24.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.496546 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:44:24.507590 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation May 10 00:44:24.538491 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:44:24.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.540144 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:24.576171 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:24.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:24.616031 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 10 00:44:24.630402 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:44:24.630418 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:44:24.630438 kernel: GPT:9289727 != 19775487 May 10 00:44:24.630447 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:44:24.630456 kernel: GPT:9289727 != 19775487 May 10 00:44:24.630464 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:44:24.630473 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:24.630488 kernel: libata version 3.00 loaded. May 10 00:44:24.630503 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:44:24.631305 kernel: AES CTR mode by8 optimization enabled May 10 00:44:24.639733 kernel: ahci 0000:00:1f.2: version 3.0 May 10 00:44:24.669176 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 00:44:24.669199 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 00:44:24.669330 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 00:44:24.669415 kernel: scsi host0: ahci May 10 00:44:24.669511 kernel: scsi host1: ahci May 10 00:44:24.669598 kernel: scsi host2: ahci May 10 00:44:24.669683 kernel: scsi host3: ahci May 10 00:44:24.669843 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (441) May 10 00:44:24.669856 kernel: scsi host4: ahci May 10 00:44:24.669967 kernel: scsi host5: ahci May 10 00:44:24.670060 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 10 00:44:24.670070 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 10 00:44:24.670078 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 10 00:44:24.670087 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 10 00:44:24.670096 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 10 00:44:24.670110 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 10 00:44:24.659120 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:44:24.663293 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:24.674822 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:44:24.679387 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:44:24.681462 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:44:24.685627 systemd[1]: Starting disk-uuid.service... May 10 00:44:24.692468 disk-uuid[526]: Primary Header is updated. May 10 00:44:24.692468 disk-uuid[526]: Secondary Entries is updated. May 10 00:44:24.692468 disk-uuid[526]: Secondary Header is updated. May 10 00:44:24.696337 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:24.698726 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:24.702736 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:24.979821 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 00:44:24.979904 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 00:44:24.979952 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 00:44:24.981759 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 00:44:24.982773 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 00:44:24.983736 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 10 00:44:24.984761 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 10 00:44:24.984771 kernel: ata3.00: applying bridge limits May 10 00:44:24.986255 kernel: ata3.00: configured for UDMA/100 May 10 00:44:24.986750 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 10 00:44:25.018865 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 10 00:44:25.036300 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:44:25.036314 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:44:25.702163 disk-uuid[527]: The operation has completed successfully. May 10 00:44:25.703777 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:44:25.725141 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:44:25.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.725233 systemd[1]: Finished disk-uuid.service. May 10 00:44:25.732976 systemd[1]: Starting verity-setup.service... May 10 00:44:25.746745 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 10 00:44:25.767690 systemd[1]: Found device dev-mapper-usr.device. May 10 00:44:25.770398 systemd[1]: Mounting sysusr-usr.mount... May 10 00:44:25.774403 systemd[1]: Finished verity-setup.service. May 10 00:44:25.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.831675 systemd[1]: Mounted sysusr-usr.mount. May 10 00:44:25.833324 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:44:25.832673 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:44:25.833490 systemd[1]: Starting ignition-setup.service... May 10 00:44:25.836449 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:44:25.843216 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:25.843255 kernel: BTRFS info (device vda6): using free space tree May 10 00:44:25.843265 kernel: BTRFS info (device vda6): has skinny extents May 10 00:44:25.852441 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:44:25.861031 systemd[1]: Finished ignition-setup.service. May 10 00:44:25.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.862378 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:44:25.904898 ignition[635]: Ignition 2.14.0 May 10 00:44:25.906120 ignition[635]: Stage: fetch-offline May 10 00:44:25.906849 ignition[635]: no configs at "/usr/lib/ignition/base.d" May 10 00:44:25.906864 ignition[635]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:25.907019 ignition[635]: parsed url from cmdline: "" May 10 00:44:25.907024 ignition[635]: no config URL provided May 10 00:44:25.907032 ignition[635]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:44:25.907042 ignition[635]: no config at "/usr/lib/ignition/user.ign" May 10 00:44:25.907065 ignition[635]: op(1): [started] loading QEMU firmware config module May 10 00:44:25.907071 ignition[635]: op(1): executing: "modprobe" "qemu_fw_cfg" May 10 00:44:25.914501 ignition[635]: op(1): [finished] loading QEMU firmware config module May 10 00:44:25.916513 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:44:25.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.918000 audit: BPF prog-id=9 op=LOAD May 10 00:44:25.919163 systemd[1]: Starting systemd-networkd.service... May 10 00:44:25.957759 ignition[635]: parsing config with SHA512: 3333cd186b85f4d1a1a57bfbb6219da2531529678e6cc460132c9fd210645f3b5aa2179dcfd6a537c8b03f72465c82061e5e13200cbea9752b8145c1403dfbb3 May 10 00:44:25.965491 unknown[635]: fetched base config from "system" May 10 00:44:25.965502 unknown[635]: fetched user config from "qemu" May 10 00:44:25.965890 ignition[635]: fetch-offline: fetch-offline passed May 10 00:44:25.967880 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:44:25.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.965945 ignition[635]: Ignition finished successfully May 10 00:44:25.985650 systemd-networkd[720]: lo: Link UP May 10 00:44:25.985661 systemd-networkd[720]: lo: Gained carrier May 10 00:44:25.987472 systemd-networkd[720]: Enumeration completed May 10 00:44:25.987552 systemd[1]: Started systemd-networkd.service. May 10 00:44:25.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.989068 systemd[1]: Reached target network.target. May 10 00:44:25.990495 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:44:25.991206 systemd[1]: Starting ignition-kargs.service... May 10 00:44:25.994164 systemd[1]: Starting iscsiuio.service... May 10 00:44:25.996015 systemd-networkd[720]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:44:25.998302 systemd[1]: Started iscsiuio.service. May 10 00:44:25.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.999479 systemd[1]: Starting iscsid.service... May 10 00:44:26.000830 systemd-networkd[720]: eth0: Link UP May 10 00:44:26.000833 systemd-networkd[720]: eth0: Gained carrier May 10 00:44:26.002988 iscsid[731]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:44:26.002988 iscsid[731]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:44:26.002988 iscsid[731]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:44:26.002988 iscsid[731]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:44:26.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.004461 systemd[1]: Started iscsid.service. May 10 00:44:26.015389 ignition[723]: Ignition 2.14.0 May 10 00:44:26.026705 iscsid[731]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:44:26.026705 iscsid[731]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:44:26.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.005646 systemd[1]: Starting dracut-initqueue.service... May 10 00:44:26.015397 ignition[723]: Stage: kargs May 10 00:44:26.018352 systemd[1]: Finished dracut-initqueue.service. May 10 00:44:26.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.015495 ignition[723]: no configs at "/usr/lib/ignition/base.d" May 10 00:44:26.019805 systemd-networkd[720]: eth0: DHCPv4 address 10.0.0.116/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:44:26.015507 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:26.020267 systemd[1]: Reached target remote-fs-pre.target. May 10 00:44:26.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.016374 ignition[723]: kargs: kargs passed May 10 00:44:26.022350 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:26.016408 ignition[723]: Ignition finished successfully May 10 00:44:26.023258 systemd[1]: Reached target remote-fs.target. May 10 00:44:26.036976 ignition[743]: Ignition 2.14.0 May 10 00:44:26.024976 systemd[1]: Starting dracut-pre-mount.service... May 10 00:44:26.036981 ignition[743]: Stage: disks May 10 00:44:26.026869 systemd[1]: Finished ignition-kargs.service. May 10 00:44:26.037077 ignition[743]: no configs at "/usr/lib/ignition/base.d" May 10 00:44:26.030043 systemd[1]: Starting ignition-disks.service... May 10 00:44:26.037087 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:26.032976 systemd[1]: Finished dracut-pre-mount.service. May 10 00:44:26.056610 systemd-fsck[754]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:44:26.038327 ignition[743]: disks: disks passed May 10 00:44:26.039019 systemd[1]: Finished ignition-disks.service. May 10 00:44:26.038363 ignition[743]: Ignition finished successfully May 10 00:44:26.040064 systemd[1]: Reached target initrd-root-device.target. May 10 00:44:26.041032 systemd[1]: Reached target local-fs-pre.target. May 10 00:44:26.042575 systemd[1]: Reached target local-fs.target. May 10 00:44:26.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.043439 systemd[1]: Reached target sysinit.target. May 10 00:44:26.044086 systemd[1]: Reached target basic.target. May 10 00:44:26.045005 systemd[1]: Starting systemd-fsck-root.service... May 10 00:44:26.061819 systemd[1]: Finished systemd-fsck-root.service. May 10 00:44:26.064591 systemd[1]: Mounting sysroot.mount... May 10 00:44:26.072741 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:44:26.072868 systemd[1]: Mounted sysroot.mount. May 10 00:44:26.073364 systemd[1]: Reached target initrd-root-fs.target. May 10 00:44:26.074357 systemd[1]: Mounting sysroot-usr.mount... May 10 00:44:26.075232 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:44:26.075261 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:44:26.075281 systemd[1]: Reached target ignition-diskful.target. May 10 00:44:26.085207 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:44:26.077739 systemd[1]: Mounted sysroot-usr.mount. May 10 00:44:26.079645 systemd[1]: Starting initrd-setup-root.service... May 10 00:44:26.088092 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory May 10 00:44:26.089529 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:44:26.092300 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:44:26.124745 systemd[1]: Finished initrd-setup-root.service. May 10 00:44:26.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.126621 systemd[1]: Starting ignition-mount.service... May 10 00:44:26.129501 systemd[1]: Starting sysroot-boot.service... May 10 00:44:26.132522 bash[805]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:44:26.140454 ignition[806]: INFO : Ignition 2.14.0 May 10 00:44:26.140454 ignition[806]: INFO : Stage: mount May 10 00:44:26.142423 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:44:26.142423 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:26.142423 ignition[806]: INFO : mount: mount passed May 10 00:44:26.142423 ignition[806]: INFO : Ignition finished successfully May 10 00:44:26.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.142518 systemd[1]: Finished ignition-mount.service. May 10 00:44:26.153092 systemd[1]: Finished sysroot-boot.service. May 10 00:44:26.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.232424 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.116 May 10 00:44:26.232443 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux9'. May 10 00:44:26.781121 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:44:26.790743 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) May 10 00:44:26.793017 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:26.793046 kernel: BTRFS info (device vda6): using free space tree May 10 00:44:26.793056 kernel: BTRFS info (device vda6): has skinny extents May 10 00:44:26.797692 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:44:26.799688 systemd[1]: Starting ignition-files.service... May 10 00:44:26.817804 ignition[836]: INFO : Ignition 2.14.0 May 10 00:44:26.817804 ignition[836]: INFO : Stage: files May 10 00:44:26.820114 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:44:26.820114 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:26.820114 ignition[836]: DEBUG : files: compiled without relabeling support, skipping May 10 00:44:26.824332 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:44:26.824332 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:44:26.824332 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:44:26.824332 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:44:26.824332 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:44:26.824332 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:44:26.824332 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:44:26.823255 unknown[836]: wrote ssh authorized keys file for user: core May 10 00:44:26.878587 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:44:26.970121 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:44:26.970121 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:44:26.974970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 10 00:44:27.321352 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:44:27.583113 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:44:27.583113 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:44:27.599378 ignition[836]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:44:27.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.624362 ignition[836]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:44:27.624362 ignition[836]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:44:27.624362 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:44:27.624362 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:44:27.624362 ignition[836]: INFO : files: files passed May 10 00:44:27.624362 ignition[836]: INFO : Ignition finished successfully May 10 00:44:27.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.612982 systemd-networkd[720]: eth0: Gained IPv6LL May 10 00:44:27.621783 systemd[1]: Finished ignition-files.service. May 10 00:44:27.625058 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:44:27.640646 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 10 00:44:27.626898 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:44:27.644596 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:44:27.627458 systemd[1]: Starting ignition-quench.service... May 10 00:44:27.630263 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:44:27.630339 systemd[1]: Finished ignition-quench.service. May 10 00:44:27.631912 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:44:27.634472 systemd[1]: Reached target ignition-complete.target. May 10 00:44:27.636668 systemd[1]: Starting initrd-parse-etc.service... May 10 00:44:27.651277 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:44:27.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.651397 systemd[1]: Finished initrd-parse-etc.service. May 10 00:44:27.653246 systemd[1]: Reached target initrd-fs.target. May 10 00:44:27.655544 systemd[1]: Reached target initrd.target. May 10 00:44:27.656520 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:44:27.657491 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:44:27.668838 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:44:27.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.670947 systemd[1]: Starting initrd-cleanup.service... May 10 00:44:27.682933 systemd[1]: Stopped target nss-lookup.target. May 10 00:44:27.684092 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:44:27.685921 systemd[1]: Stopped target timers.target. May 10 00:44:27.687664 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:44:27.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.687856 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:44:27.689483 systemd[1]: Stopped target initrd.target. May 10 00:44:27.691232 systemd[1]: Stopped target basic.target. May 10 00:44:27.692962 systemd[1]: Stopped target ignition-complete.target. May 10 00:44:27.694580 systemd[1]: Stopped target ignition-diskful.target. May 10 00:44:27.696218 systemd[1]: Stopped target initrd-root-device.target. May 10 00:44:27.698013 systemd[1]: Stopped target remote-fs.target. May 10 00:44:27.699832 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:44:27.701570 systemd[1]: Stopped target sysinit.target. May 10 00:44:27.703197 systemd[1]: Stopped target local-fs.target. May 10 00:44:27.704958 systemd[1]: Stopped target local-fs-pre.target. May 10 00:44:27.706823 systemd[1]: Stopped target swap.target. May 10 00:44:27.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.708671 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:44:27.708873 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:44:27.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.710773 systemd[1]: Stopped target cryptsetup.target. May 10 00:44:27.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.712310 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:44:27.712442 systemd[1]: Stopped dracut-initqueue.service. May 10 00:44:27.714679 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:44:27.714828 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:44:27.716634 systemd[1]: Stopped target paths.target. May 10 00:44:27.718241 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:44:27.721792 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:44:27.723377 systemd[1]: Stopped target slices.target. May 10 00:44:27.725056 systemd[1]: Stopped target sockets.target. May 10 00:44:27.727153 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:44:27.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.727270 systemd[1]: Closed iscsid.socket. May 10 00:44:27.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.729100 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:44:27.729220 systemd[1]: Closed iscsiuio.socket. May 10 00:44:27.730889 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:44:27.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.731041 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:44:27.746708 ignition[876]: INFO : Ignition 2.14.0 May 10 00:44:27.746708 ignition[876]: INFO : Stage: umount May 10 00:44:27.746708 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:44:27.746708 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:44:27.746708 ignition[876]: INFO : umount: umount passed May 10 00:44:27.746708 ignition[876]: INFO : Ignition finished successfully May 10 00:44:27.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.732756 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:44:27.732912 systemd[1]: Stopped ignition-files.service. May 10 00:44:27.735522 systemd[1]: Stopping ignition-mount.service... May 10 00:44:27.737799 systemd[1]: Stopping sysroot-boot.service... May 10 00:44:27.739485 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:44:27.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.739657 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:44:27.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.740884 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:44:27.741036 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:44:27.747138 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:44:27.747256 systemd[1]: Finished initrd-cleanup.service. May 10 00:44:27.779000 audit: BPF prog-id=6 op=UNLOAD May 10 00:44:27.749379 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:44:27.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.749477 systemd[1]: Stopped ignition-mount.service. May 10 00:44:27.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.751557 systemd[1]: Stopped target network.target. May 10 00:44:27.753555 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:44:27.753637 systemd[1]: Stopped ignition-disks.service. May 10 00:44:27.756092 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:44:27.756154 systemd[1]: Stopped ignition-kargs.service. May 10 00:44:27.758029 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:44:27.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.758088 systemd[1]: Stopped ignition-setup.service. May 10 00:44:27.760820 systemd[1]: Stopping systemd-networkd.service... May 10 00:44:27.762123 systemd[1]: Stopping systemd-resolved.service... May 10 00:44:27.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.764815 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:44:27.766776 systemd-networkd[720]: eth0: DHCPv6 lease lost May 10 00:44:27.801000 audit: BPF prog-id=9 op=UNLOAD May 10 00:44:27.768103 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:44:27.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.768245 systemd[1]: Stopped systemd-networkd.service. May 10 00:44:27.771821 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:44:27.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.771948 systemd[1]: Stopped systemd-resolved.service. May 10 00:44:27.776586 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:44:27.776628 systemd[1]: Closed systemd-networkd.socket. May 10 00:44:27.779462 systemd[1]: Stopping network-cleanup.service... May 10 00:44:27.780376 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:44:27.780440 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:44:27.781702 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:44:27.781837 systemd[1]: Stopped systemd-sysctl.service. May 10 00:44:27.783935 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:44:27.783985 systemd[1]: Stopped systemd-modules-load.service. May 10 00:44:27.785346 systemd[1]: Stopping systemd-udevd.service... May 10 00:44:27.788921 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:44:27.792414 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:44:27.792527 systemd[1]: Stopped network-cleanup.service. May 10 00:44:27.797140 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:44:27.797326 systemd[1]: Stopped systemd-udevd.service. May 10 00:44:27.800266 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:44:27.800316 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:44:27.802398 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:44:27.802448 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:44:27.804476 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:44:27.804532 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:44:27.805091 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:44:27.805135 systemd[1]: Stopped dracut-cmdline.service. May 10 00:44:27.805285 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:44:27.805316 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:44:27.806274 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:44:27.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.806545 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:44:27.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.806588 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:44:27.809528 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:44:27.809572 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:44:27.811701 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:44:27.811761 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:44:27.813770 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:44:27.814263 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:44:27.814363 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:44:27.845235 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:44:27.845356 systemd[1]: Stopped sysroot-boot.service. May 10 00:44:27.846787 systemd[1]: Reached target initrd-switch-root.target. May 10 00:44:27.848597 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:44:27.848655 systemd[1]: Stopped initrd-setup-root.service. May 10 00:44:27.850509 systemd[1]: Starting initrd-switch-root.service... May 10 00:44:27.864280 systemd[1]: Switching root. May 10 00:44:27.885377 iscsid[731]: iscsid shutting down. May 10 00:44:27.886557 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). May 10 00:44:27.886630 systemd-journald[198]: Journal stopped May 10 00:44:31.793564 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:44:31.793633 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:44:31.793647 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:44:31.793660 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:44:31.793676 kernel: SELinux: policy capability open_perms=1 May 10 00:44:31.793707 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:44:31.793733 kernel: SELinux: policy capability always_check_network=0 May 10 00:44:31.793743 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:44:31.793755 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:44:31.793778 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:44:31.793790 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:44:31.793804 systemd[1]: Successfully loaded SELinux policy in 49.536ms. May 10 00:44:31.793820 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.423ms. May 10 00:44:31.793832 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:31.793851 systemd[1]: Detected virtualization kvm. May 10 00:44:31.793864 systemd[1]: Detected architecture x86-64. May 10 00:44:31.793874 systemd[1]: Detected first boot. May 10 00:44:31.793884 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:31.793908 kernel: kauditd_printk_skb: 66 callbacks suppressed May 10 00:44:31.793932 kernel: audit: type=1400 audit(1746837868.257:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:31.793947 kernel: audit: type=1400 audit(1746837868.257:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:31.793973 kernel: audit: type=1334 audit(1746837868.262:79): prog-id=10 op=LOAD May 10 00:44:31.793987 kernel: audit: type=1334 audit(1746837868.262:80): prog-id=10 op=UNLOAD May 10 00:44:31.794002 kernel: audit: type=1334 audit(1746837868.266:81): prog-id=11 op=LOAD May 10 00:44:31.794018 kernel: audit: type=1334 audit(1746837868.266:82): prog-id=11 op=UNLOAD May 10 00:44:31.794032 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:44:31.794043 kernel: audit: type=1400 audit(1746837868.305:83): avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:44:31.794054 kernel: audit: type=1300 audit(1746837868.305:83): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.794076 kernel: audit: type=1327 audit(1746837868.305:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:31.794093 kernel: audit: type=1400 audit(1746837868.307:84): avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:44:31.794111 systemd[1]: Populated /etc with preset unit settings. May 10 00:44:31.794127 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:31.794142 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:31.794155 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:31.794175 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:44:31.794185 systemd[1]: Stopped iscsiuio.service. May 10 00:44:31.794202 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:44:31.794215 systemd[1]: Stopped iscsid.service. May 10 00:44:31.794227 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:44:31.794238 systemd[1]: Stopped initrd-switch-root.service. May 10 00:44:31.794255 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:44:31.794266 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:44:31.794277 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:44:31.794287 systemd[1]: Created slice system-getty.slice. May 10 00:44:31.794298 systemd[1]: Created slice system-modprobe.slice. May 10 00:44:31.794308 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:44:31.794320 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:44:31.794337 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:44:31.794348 systemd[1]: Created slice user.slice. May 10 00:44:31.794358 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:31.794368 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:44:31.794379 systemd[1]: Set up automount boot.automount. May 10 00:44:31.794389 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:44:31.794402 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:44:31.794417 systemd[1]: Stopped target initrd-fs.target. May 10 00:44:31.794431 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:44:31.794456 systemd[1]: Reached target integritysetup.target. May 10 00:44:31.794471 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:31.794486 systemd[1]: Reached target remote-fs.target. May 10 00:44:31.794501 systemd[1]: Reached target slices.target. May 10 00:44:31.794523 systemd[1]: Reached target swap.target. May 10 00:44:31.794538 systemd[1]: Reached target torcx.target. May 10 00:44:31.794553 systemd[1]: Reached target veritysetup.target. May 10 00:44:31.794567 systemd[1]: Listening on systemd-coredump.socket. May 10 00:44:31.794581 systemd[1]: Listening on systemd-initctl.socket. May 10 00:44:31.794593 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:31.794614 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:31.794626 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:31.794637 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:44:31.794647 systemd[1]: Mounting dev-hugepages.mount... May 10 00:44:31.794657 systemd[1]: Mounting dev-mqueue.mount... May 10 00:44:31.794669 systemd[1]: Mounting media.mount... May 10 00:44:31.794684 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:31.794698 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:44:31.794729 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:44:31.794751 systemd[1]: Mounting tmp.mount... May 10 00:44:31.794762 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:44:31.794780 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:31.794790 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:31.794801 systemd[1]: Starting modprobe@configfs.service... May 10 00:44:31.794811 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:31.794822 systemd[1]: Starting modprobe@drm.service... May 10 00:44:31.794832 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:31.794843 systemd[1]: Starting modprobe@fuse.service... May 10 00:44:31.794864 systemd[1]: Starting modprobe@loop.service... May 10 00:44:31.794875 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:44:31.794886 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:44:31.794897 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:44:31.794909 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:44:31.794919 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:44:31.794929 kernel: loop: module loaded May 10 00:44:31.794939 systemd[1]: Stopped systemd-journald.service. May 10 00:44:31.794949 kernel: fuse: init (API version 7.34) May 10 00:44:31.794966 systemd[1]: Starting systemd-journald.service... May 10 00:44:31.794976 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:31.794987 systemd[1]: Starting systemd-network-generator.service... May 10 00:44:31.794997 systemd[1]: Starting systemd-remount-fs.service... May 10 00:44:31.795008 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:31.795018 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:44:31.795029 systemd[1]: Stopped verity-setup.service. May 10 00:44:31.795040 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:31.795054 systemd-journald[994]: Journal started May 10 00:44:31.795131 systemd-journald[994]: Runtime Journal (/run/log/journal/2b44d4dbed6e4fa9a9930221e8d6dc20) is 6.0M, max 48.4M, 42.4M free. May 10 00:44:27.963000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:44:28.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:28.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:28.262000 audit: BPF prog-id=10 op=LOAD May 10 00:44:28.262000 audit: BPF prog-id=10 op=UNLOAD May 10 00:44:28.266000 audit: BPF prog-id=11 op=LOAD May 10 00:44:28.266000 audit: BPF prog-id=11 op=UNLOAD May 10 00:44:28.305000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:44:28.305000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.305000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:28.307000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:44:28.307000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.307000 audit: CWD cwd="/" May 10 00:44:28.307000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:28.307000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:28.307000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:31.641000 audit: BPF prog-id=12 op=LOAD May 10 00:44:31.641000 audit: BPF prog-id=3 op=UNLOAD May 10 00:44:31.641000 audit: BPF prog-id=13 op=LOAD May 10 00:44:31.641000 audit: BPF prog-id=14 op=LOAD May 10 00:44:31.642000 audit: BPF prog-id=4 op=UNLOAD May 10 00:44:31.642000 audit: BPF prog-id=5 op=UNLOAD May 10 00:44:31.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.656000 audit: BPF prog-id=12 op=UNLOAD May 10 00:44:31.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.771000 audit: BPF prog-id=15 op=LOAD May 10 00:44:31.771000 audit: BPF prog-id=16 op=LOAD May 10 00:44:31.771000 audit: BPF prog-id=17 op=LOAD May 10 00:44:31.771000 audit: BPF prog-id=13 op=UNLOAD May 10 00:44:31.771000 audit: BPF prog-id=14 op=UNLOAD May 10 00:44:31.791000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:44:31.791000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffd13d06e0 a2=4000 a3=7fffd13d077c items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.791000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:44:31.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.640296 systemd[1]: Queued start job for default target multi-user.target. May 10 00:44:28.303924 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:31.640309 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:44:28.304341 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:44:31.644156 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:44:28.304371 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:44:28.304414 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:44:28.304427 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:44:28.304474 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:44:28.304492 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:44:28.304785 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:44:28.304838 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:44:28.304867 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:44:28.305538 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:44:28.305595 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:44:28.305623 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:44:28.305637 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:44:28.305655 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:44:28.305669 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:44:31.341184 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:31.341592 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:31.341773 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:31.342008 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:31.342064 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:44:31.342139 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-10T00:44:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:44:31.799739 systemd[1]: Started systemd-journald.service. May 10 00:44:31.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.800285 systemd[1]: Mounted dev-hugepages.mount. May 10 00:44:31.801206 systemd[1]: Mounted dev-mqueue.mount. May 10 00:44:31.802089 systemd[1]: Mounted media.mount. May 10 00:44:31.802981 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:44:31.803972 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:44:31.805045 systemd[1]: Mounted tmp.mount. May 10 00:44:31.806291 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:44:31.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.807695 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:31.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.809088 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:44:31.809343 systemd[1]: Finished modprobe@configfs.service. May 10 00:44:31.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.810659 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:31.810959 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:31.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.812310 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:31.812538 systemd[1]: Finished modprobe@drm.service. May 10 00:44:31.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.813920 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:31.814128 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:31.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.815581 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:44:31.815818 systemd[1]: Finished modprobe@fuse.service. May 10 00:44:31.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.816975 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:31.817174 systemd[1]: Finished modprobe@loop.service. May 10 00:44:31.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.818514 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:31.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.819824 systemd[1]: Finished systemd-network-generator.service. May 10 00:44:31.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.821177 systemd[1]: Finished systemd-remount-fs.service. May 10 00:44:31.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.822546 systemd[1]: Reached target network-pre.target. May 10 00:44:31.824617 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:44:31.827235 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:44:31.828123 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:44:31.829892 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:44:31.832086 systemd[1]: Starting systemd-journal-flush.service... May 10 00:44:31.837115 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:31.838472 systemd[1]: Starting systemd-random-seed.service... May 10 00:44:31.839526 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:31.859119 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:31.861245 systemd[1]: Starting systemd-sysusers.service... May 10 00:44:31.864733 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:44:31.865702 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:44:31.871952 systemd-journald[994]: Time spent on flushing to /var/log/journal/2b44d4dbed6e4fa9a9930221e8d6dc20 is 23.135ms for 1163 entries. May 10 00:44:31.871952 systemd-journald[994]: System Journal (/var/log/journal/2b44d4dbed6e4fa9a9930221e8d6dc20) is 8.0M, max 195.6M, 187.6M free. May 10 00:44:31.914874 systemd-journald[994]: Received client request to flush runtime journal. May 10 00:44:31.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.873805 systemd[1]: Finished systemd-random-seed.service. May 10 00:44:31.916396 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:44:31.875025 systemd[1]: Reached target first-boot-complete.target. May 10 00:44:31.879190 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:31.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.881575 systemd[1]: Starting systemd-udev-settle.service... May 10 00:44:31.884803 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:31.892071 systemd[1]: Finished systemd-sysusers.service. May 10 00:44:31.894182 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:44:31.914735 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:44:31.916043 systemd[1]: Finished systemd-journal-flush.service. May 10 00:44:32.621283 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:44:32.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.622000 audit: BPF prog-id=18 op=LOAD May 10 00:44:32.622000 audit: BPF prog-id=19 op=LOAD May 10 00:44:32.622000 audit: BPF prog-id=7 op=UNLOAD May 10 00:44:32.622000 audit: BPF prog-id=8 op=UNLOAD May 10 00:44:32.624205 systemd[1]: Starting systemd-udevd.service... May 10 00:44:32.646047 systemd-udevd[1017]: Using default interface naming scheme 'v252'. May 10 00:44:32.662391 systemd[1]: Started systemd-udevd.service. May 10 00:44:32.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.664000 audit: BPF prog-id=20 op=LOAD May 10 00:44:32.665914 systemd[1]: Starting systemd-networkd.service... May 10 00:44:32.669000 audit: BPF prog-id=21 op=LOAD May 10 00:44:32.669000 audit: BPF prog-id=22 op=LOAD May 10 00:44:32.669000 audit: BPF prog-id=23 op=LOAD May 10 00:44:32.671487 systemd[1]: Starting systemd-userdbd.service... May 10 00:44:32.705072 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:44:32.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.713271 systemd[1]: Started systemd-userdbd.service. May 10 00:44:32.741803 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:32.745751 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:44:32.754819 kernel: ACPI: button: Power Button [PWRF] May 10 00:44:32.765000 audit[1033]: AVC avc: denied { confidentiality } for pid=1033 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:44:32.765000 audit[1033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56538ed13590 a1=338ac a2=7fe27b9cfbc5 a3=5 items=110 ppid=1017 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:32.765000 audit: CWD cwd="/" May 10 00:44:32.765000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=1 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=2 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=3 name=(null) inode=13836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=4 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=5 name=(null) inode=13837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=6 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=7 name=(null) inode=13838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=8 name=(null) inode=13838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=9 name=(null) inode=13839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=10 name=(null) inode=13838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=11 name=(null) inode=13840 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=12 name=(null) inode=13838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=13 name=(null) inode=13841 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=14 name=(null) inode=13838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=15 name=(null) inode=13842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=16 name=(null) inode=13838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=17 name=(null) inode=13843 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=18 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=19 name=(null) inode=13844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=20 name=(null) inode=13844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=21 name=(null) inode=13845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=22 name=(null) inode=13844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=23 name=(null) inode=13846 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=24 name=(null) inode=13844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=25 name=(null) inode=13847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=26 name=(null) inode=13844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=27 name=(null) inode=13848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.775418 systemd-networkd[1022]: lo: Link UP May 10 00:44:32.775423 systemd-networkd[1022]: lo: Gained carrier May 10 00:44:32.765000 audit: PATH item=28 name=(null) inode=13844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=29 name=(null) inode=13849 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=30 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.775933 systemd-networkd[1022]: Enumeration completed May 10 00:44:32.765000 audit: PATH item=31 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.776071 systemd[1]: Started systemd-networkd.service. May 10 00:44:32.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.776880 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:44:32.765000 audit: PATH item=32 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=33 name=(null) inode=13851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=34 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=35 name=(null) inode=13852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=36 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=37 name=(null) inode=13853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=38 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=39 name=(null) inode=13854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=40 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=41 name=(null) inode=13855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=42 name=(null) inode=13835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=43 name=(null) inode=13856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=44 name=(null) inode=13856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=45 name=(null) inode=13857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=46 name=(null) inode=13856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=47 name=(null) inode=13858 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=48 name=(null) inode=13856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=49 name=(null) inode=13859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=50 name=(null) inode=13856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=51 name=(null) inode=13860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=52 name=(null) inode=13856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=53 name=(null) inode=13861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=55 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=56 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=57 name=(null) inode=13863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=58 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=59 name=(null) inode=13864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=60 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=61 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=62 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=63 name=(null) inode=13866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=64 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=65 name=(null) inode=13867 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=66 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=67 name=(null) inode=13868 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=68 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=69 name=(null) inode=13869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=70 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=71 name=(null) inode=13870 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.780826 systemd-networkd[1022]: eth0: Link UP May 10 00:44:32.780838 systemd-networkd[1022]: eth0: Gained carrier May 10 00:44:32.765000 audit: PATH item=72 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=73 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=74 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=75 name=(null) inode=13872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=76 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=77 name=(null) inode=13873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=78 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=79 name=(null) inode=13874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=80 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=81 name=(null) inode=13875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=82 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=83 name=(null) inode=13876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=84 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=85 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=86 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=87 name=(null) inode=13878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=88 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=89 name=(null) inode=13879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=90 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=91 name=(null) inode=13880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=92 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=93 name=(null) inode=13881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=94 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.782753 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:44:32.765000 audit: PATH item=95 name=(null) inode=13882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=96 name=(null) inode=13862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=97 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=98 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=99 name=(null) inode=13884 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=100 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=101 name=(null) inode=13885 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=102 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=103 name=(null) inode=13886 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=104 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=105 name=(null) inode=13887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=106 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=107 name=(null) inode=13888 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PATH item=109 name=(null) inode=14566 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:32.765000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:44:32.790162 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 10 00:44:32.792593 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 00:44:32.792729 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 00:44:32.792863 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 00:44:32.796064 systemd-networkd[1022]: eth0: DHCPv4 address 10.0.0.116/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:44:32.808752 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:44:32.888416 kernel: kvm: Nested Virtualization enabled May 10 00:44:32.888553 kernel: SVM: kvm: Nested Paging enabled May 10 00:44:32.888600 kernel: SVM: Virtual VMLOAD VMSAVE supported May 10 00:44:32.889212 kernel: SVM: Virtual GIF supported May 10 00:44:32.905748 kernel: EDAC MC: Ver: 3.0.0 May 10 00:44:32.935302 systemd[1]: Finished systemd-udev-settle.service. May 10 00:44:32.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.937582 systemd[1]: Starting lvm2-activation-early.service... May 10 00:44:32.946398 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:44:32.976150 systemd[1]: Finished lvm2-activation-early.service. May 10 00:44:32.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.977370 systemd[1]: Reached target cryptsetup.target. May 10 00:44:32.979460 systemd[1]: Starting lvm2-activation.service... May 10 00:44:32.984721 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:44:33.013082 systemd[1]: Finished lvm2-activation.service. May 10 00:44:33.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.015770 systemd[1]: Reached target local-fs-pre.target. May 10 00:44:33.016730 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:44:33.016762 systemd[1]: Reached target local-fs.target. May 10 00:44:33.017604 systemd[1]: Reached target machines.target. May 10 00:44:33.019730 systemd[1]: Starting ldconfig.service... May 10 00:44:33.020845 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:33.020894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:33.021891 systemd[1]: Starting systemd-boot-update.service... May 10 00:44:33.023584 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:44:33.025809 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:44:33.028153 systemd[1]: Starting systemd-sysext.service... May 10 00:44:33.029000 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1056 (bootctl) May 10 00:44:33.030579 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:44:33.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.040273 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:44:33.042210 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:44:33.048727 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:44:33.048994 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:44:33.108742 kernel: loop0: detected capacity change from 0 to 205544 May 10 00:44:33.127693 systemd-fsck[1064]: fsck.fat 4.2 (2021-01-31) May 10 00:44:33.127693 systemd-fsck[1064]: /dev/vda1: 791 files, 120708/258078 clusters May 10 00:44:33.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.130469 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:44:33.134394 systemd[1]: Mounting boot.mount... May 10 00:44:33.526037 systemd[1]: Mounted boot.mount. May 10 00:44:33.530750 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:44:33.537586 systemd[1]: Finished systemd-boot-update.service. May 10 00:44:33.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.543989 kernel: kauditd_printk_skb: 185 callbacks suppressed May 10 00:44:33.544066 kernel: audit: type=1130 audit(1746837873.541:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.552807 kernel: loop1: detected capacity change from 0 to 205544 May 10 00:44:33.557459 (sd-sysext)[1069]: Using extensions 'kubernetes'. May 10 00:44:33.557871 (sd-sysext)[1069]: Merged extensions into '/usr'. May 10 00:44:33.592272 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:33.593927 systemd[1]: Mounting usr-share-oem.mount... May 10 00:44:33.601681 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:33.603069 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:33.637918 kernel: audit: type=1130 audit(1746837873.611:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.638049 kernel: audit: type=1131 audit(1746837873.611:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.638084 kernel: audit: type=1130 audit(1746837873.627:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.638110 kernel: audit: type=1131 audit(1746837873.627:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.638137 kernel: audit: type=1130 audit(1746837873.637:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.605210 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:33.607968 systemd[1]: Starting modprobe@loop.service... May 10 00:44:33.608989 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:33.609136 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:33.609280 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:33.610412 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:33.610589 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:33.614377 systemd[1]: Mounted usr-share-oem.mount. May 10 00:44:33.626538 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:33.626672 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:33.628244 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:33.628374 systemd[1]: Finished modprobe@loop.service. May 10 00:44:33.638417 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:33.638541 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:33.640213 systemd[1]: Finished systemd-sysext.service. May 10 00:44:33.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.647602 kernel: audit: type=1131 audit(1746837873.637:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.650852 systemd[1]: Starting ensure-sysext.service... May 10 00:44:33.653805 kernel: audit: type=1130 audit(1746837873.648:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.656372 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:44:33.661348 systemd[1]: Reloading. May 10 00:44:33.696235 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:44:33.697628 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:44:33.699389 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:44:33.719675 ldconfig[1055]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:44:33.774784 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-10T00:44:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:33.774813 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-10T00:44:33Z" level=info msg="torcx already run" May 10 00:44:33.873683 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:33.873701 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:33.893023 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:33.953179 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:44:33.956000 audit: BPF prog-id=24 op=LOAD May 10 00:44:33.957000 audit: BPF prog-id=25 op=LOAD May 10 00:44:33.959158 kernel: audit: type=1334 audit(1746837873.956:158): prog-id=24 op=LOAD May 10 00:44:33.959222 kernel: audit: type=1334 audit(1746837873.957:159): prog-id=25 op=LOAD May 10 00:44:33.957000 audit: BPF prog-id=18 op=UNLOAD May 10 00:44:33.957000 audit: BPF prog-id=19 op=UNLOAD May 10 00:44:33.958000 audit: BPF prog-id=26 op=LOAD May 10 00:44:33.958000 audit: BPF prog-id=21 op=UNLOAD May 10 00:44:33.958000 audit: BPF prog-id=27 op=LOAD May 10 00:44:33.958000 audit: BPF prog-id=28 op=LOAD May 10 00:44:33.958000 audit: BPF prog-id=22 op=UNLOAD May 10 00:44:33.958000 audit: BPF prog-id=23 op=UNLOAD May 10 00:44:33.960000 audit: BPF prog-id=29 op=LOAD May 10 00:44:33.960000 audit: BPF prog-id=20 op=UNLOAD May 10 00:44:33.960000 audit: BPF prog-id=30 op=LOAD May 10 00:44:33.960000 audit: BPF prog-id=15 op=UNLOAD May 10 00:44:33.961000 audit: BPF prog-id=31 op=LOAD May 10 00:44:33.961000 audit: BPF prog-id=32 op=LOAD May 10 00:44:33.961000 audit: BPF prog-id=16 op=UNLOAD May 10 00:44:33.961000 audit: BPF prog-id=17 op=UNLOAD May 10 00:44:33.963683 systemd[1]: Finished ldconfig.service. May 10 00:44:33.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.964896 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:44:33.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.967112 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:44:33.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.971150 systemd[1]: Starting audit-rules.service... May 10 00:44:33.972996 systemd[1]: Starting clean-ca-certificates.service... May 10 00:44:33.975226 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:44:33.976000 audit: BPF prog-id=33 op=LOAD May 10 00:44:33.978435 systemd[1]: Starting systemd-resolved.service... May 10 00:44:33.980000 audit: BPF prog-id=34 op=LOAD May 10 00:44:33.982854 systemd[1]: Starting systemd-timesyncd.service... May 10 00:44:33.985058 systemd[1]: Starting systemd-update-utmp.service... May 10 00:44:33.986606 systemd[1]: Finished clean-ca-certificates.service. May 10 00:44:33.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.994000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:44:33.990170 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:33.999466 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:44:34.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:34.001774 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:34.004599 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:34.007390 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:34.010157 systemd[1]: Starting modprobe@loop.service... May 10 00:44:34.011199 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:34.011393 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:34.013786 systemd[1]: Starting systemd-update-done.service... May 10 00:44:34.014959 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:34.014000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:44:34.014000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdc529010 a2=420 a3=0 items=0 ppid=1139 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:34.014000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:44:34.015832 augenrules[1164]: No rules May 10 00:44:34.016174 systemd[1]: Finished audit-rules.service. May 10 00:44:34.017370 systemd[1]: Finished systemd-update-utmp.service. May 10 00:44:34.018699 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:34.018832 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:34.020098 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:34.020209 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:34.021487 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:34.021603 systemd[1]: Finished modprobe@loop.service. May 10 00:44:34.022937 systemd[1]: Finished systemd-update-done.service. May 10 00:44:34.026314 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:34.028323 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:34.031801 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:34.057168 systemd[1]: Starting modprobe@loop.service... May 10 00:44:34.058279 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:34.058404 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:34.058499 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:34.061644 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:34.061791 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:34.063054 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:34.063166 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:34.064604 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:34.064746 systemd[1]: Finished modprobe@loop.service. May 10 00:44:34.066107 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:34.066193 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:34.066281 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:34.066348 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:34.068868 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:34.069070 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:34.070790 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:34.078774 systemd-resolved[1143]: Positive Trust Anchors: May 10 00:44:34.078799 systemd-resolved[1143]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:34.078832 systemd-resolved[1143]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:34.079576 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 10 00:44:34.079862 systemd-timesyncd[1150]: Initial clock synchronization to Sat 2025-05-10 00:44:34.444521 UTC. May 10 00:44:34.080742 systemd[1]: Starting modprobe@drm.service... May 10 00:44:34.083211 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:34.085688 systemd[1]: Starting modprobe@loop.service... May 10 00:44:34.086787 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:34.086929 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:34.087242 systemd-resolved[1143]: Defaulting to hostname 'linux'. May 10 00:44:34.089254 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:44:34.090232 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:34.090327 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:34.091202 systemd[1]: Started systemd-timesyncd.service. May 10 00:44:34.092772 systemd[1]: Started systemd-resolved.service. May 10 00:44:34.093986 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:34.094103 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:34.095313 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:34.095419 systemd[1]: Finished modprobe@drm.service. May 10 00:44:34.096593 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:34.096700 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:34.097965 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:34.098070 systemd[1]: Finished modprobe@loop.service. May 10 00:44:34.099383 systemd[1]: Reached target network.target. May 10 00:44:34.100361 systemd[1]: Reached target nss-lookup.target. May 10 00:44:34.101317 systemd[1]: Reached target time-set.target. May 10 00:44:34.102162 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:34.102185 systemd[1]: Reached target sysinit.target. May 10 00:44:34.103100 systemd[1]: Started motdgen.path. May 10 00:44:34.103857 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:44:34.105150 systemd[1]: Started logrotate.timer. May 10 00:44:34.106011 systemd[1]: Started mdadm.timer. May 10 00:44:34.106773 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:44:34.107679 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:44:34.107703 systemd[1]: Reached target paths.target. May 10 00:44:34.108500 systemd[1]: Reached target timers.target. May 10 00:44:34.109590 systemd[1]: Listening on dbus.socket. May 10 00:44:34.111443 systemd[1]: Starting docker.socket... May 10 00:44:34.114918 systemd[1]: Listening on sshd.socket. May 10 00:44:34.115899 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:34.115942 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:34.116525 systemd[1]: Finished ensure-sysext.service. May 10 00:44:34.117537 systemd[1]: Listening on docker.socket. May 10 00:44:34.119203 systemd[1]: Reached target sockets.target. May 10 00:44:34.120328 systemd[1]: Reached target basic.target. May 10 00:44:34.121212 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:44:34.121240 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:44:34.122473 systemd[1]: Starting containerd.service... May 10 00:44:34.139605 systemd[1]: Starting dbus.service... May 10 00:44:34.142012 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:44:34.144704 systemd[1]: Starting extend-filesystems.service... May 10 00:44:34.146029 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:44:34.146371 jq[1183]: false May 10 00:44:34.147346 systemd[1]: Starting motdgen.service... May 10 00:44:34.149730 systemd[1]: Starting prepare-helm.service... May 10 00:44:34.152254 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:44:34.155433 systemd[1]: Starting sshd-keygen.service... May 10 00:44:34.159621 extend-filesystems[1184]: Found loop1 May 10 00:44:34.159621 extend-filesystems[1184]: Found sr0 May 10 00:44:34.159621 extend-filesystems[1184]: Found vda May 10 00:44:34.159621 extend-filesystems[1184]: Found vda1 May 10 00:44:34.159621 extend-filesystems[1184]: Found vda2 May 10 00:44:34.159621 extend-filesystems[1184]: Found vda3 May 10 00:44:34.159621 extend-filesystems[1184]: Found usr May 10 00:44:34.159621 extend-filesystems[1184]: Found vda4 May 10 00:44:34.159621 extend-filesystems[1184]: Found vda6 May 10 00:44:34.159621 extend-filesystems[1184]: Found vda7 May 10 00:44:34.159621 extend-filesystems[1184]: Found vda9 May 10 00:44:34.159621 extend-filesystems[1184]: Checking size of /dev/vda9 May 10 00:44:34.240852 extend-filesystems[1184]: Resized partition /dev/vda9 May 10 00:44:34.203900 dbus-daemon[1182]: [system] SELinux support is enabled May 10 00:44:34.162063 systemd[1]: Starting systemd-logind.service... May 10 00:44:34.243380 extend-filesystems[1209]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:44:34.177677 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:34.177901 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:44:34.178626 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:44:34.245849 jq[1204]: true May 10 00:44:34.179860 systemd[1]: Starting update-engine.service... May 10 00:44:34.185110 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:44:34.188640 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:44:34.188900 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:44:34.189305 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:44:34.189494 systemd[1]: Finished motdgen.service. May 10 00:44:34.214414 systemd[1]: Started dbus.service. May 10 00:44:34.218405 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:44:34.218631 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:44:34.235873 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:44:34.235923 systemd[1]: Reached target system-config.target. May 10 00:44:34.237420 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:44:34.237451 systemd[1]: Reached target user-config.target. May 10 00:44:34.279759 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 10 00:44:34.285633 tar[1208]: linux-amd64/helm May 10 00:44:34.293565 jq[1211]: true May 10 00:44:34.306004 update_engine[1203]: I0510 00:44:34.305756 1203 main.cc:92] Flatcar Update Engine starting May 10 00:44:34.309975 systemd[1]: Started update-engine.service. May 10 00:44:34.317047 update_engine[1203]: I0510 00:44:34.310004 1203 update_check_scheduler.cc:74] Next update check in 11m24s May 10 00:44:34.313826 systemd[1]: Started locksmithd.service. May 10 00:44:34.315684 systemd-logind[1200]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:44:34.315698 systemd-logind[1200]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:44:34.316073 systemd-logind[1200]: New seat seat0. May 10 00:44:34.381002 systemd[1]: Started systemd-logind.service. May 10 00:44:34.407553 env[1212]: time="2025-05-10T00:44:34.407450920Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:44:34.423947 env[1212]: time="2025-05-10T00:44:34.423903961Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:44:34.424086 env[1212]: time="2025-05-10T00:44:34.424063531Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:34.425865 env[1212]: time="2025-05-10T00:44:34.425833992Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:34.425865 env[1212]: time="2025-05-10T00:44:34.425863126Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:34.426106 env[1212]: time="2025-05-10T00:44:34.426081215Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:34.426106 env[1212]: time="2025-05-10T00:44:34.426102265Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:44:34.426184 env[1212]: time="2025-05-10T00:44:34.426115269Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:44:34.426184 env[1212]: time="2025-05-10T00:44:34.426125138Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:44:34.426225 env[1212]: time="2025-05-10T00:44:34.426205839Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:34.426497 env[1212]: time="2025-05-10T00:44:34.426474433Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:34.426630 env[1212]: time="2025-05-10T00:44:34.426604246Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:34.426630 env[1212]: time="2025-05-10T00:44:34.426623432Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:44:34.426731 env[1212]: time="2025-05-10T00:44:34.426683635Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:44:34.426731 env[1212]: time="2025-05-10T00:44:34.426695478Z" level=info msg="metadata content store policy set" policy=shared May 10 00:44:34.471742 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 10 00:44:34.588099 systemd-networkd[1022]: eth0: Gained IPv6LL May 10 00:44:34.589972 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:44:34.591614 systemd[1]: Reached target network-online.target. May 10 00:44:34.623200 systemd[1]: Starting kubelet.service... May 10 00:44:34.641767 locksmithd[1221]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:44:35.209248 extend-filesystems[1209]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:44:35.209248 extend-filesystems[1209]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:44:35.209248 extend-filesystems[1209]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 10 00:44:35.226719 extend-filesystems[1184]: Resized filesystem in /dev/vda9 May 10 00:44:35.210441 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:44:35.210691 systemd[1]: Finished extend-filesystems.service. May 10 00:44:35.280649 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:44:35.320058 systemd[1]: Finished sshd-keygen.service. May 10 00:44:35.322788 systemd[1]: Starting issuegen.service... May 10 00:44:35.330098 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:44:35.330330 systemd[1]: Finished issuegen.service. May 10 00:44:35.333329 systemd[1]: Starting systemd-user-sessions.service... May 10 00:44:35.383418 systemd[1]: Finished systemd-user-sessions.service. May 10 00:44:35.387855 systemd[1]: Started getty@tty1.service. May 10 00:44:35.390321 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:44:35.391699 systemd[1]: Reached target getty.target. May 10 00:44:35.512010 env[1212]: time="2025-05-10T00:44:35.511861509Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:44:35.512010 env[1212]: time="2025-05-10T00:44:35.511959218Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:44:35.512010 env[1212]: time="2025-05-10T00:44:35.511986255Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512071299Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512217229Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512248406Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512269451Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512293620Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512310821Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512337158Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512357125Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:44:35.512473 env[1212]: time="2025-05-10T00:44:35.512381094Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:44:35.512775 env[1212]: time="2025-05-10T00:44:35.512529485Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:44:35.512775 env[1212]: time="2025-05-10T00:44:35.512641661Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:44:35.513309 env[1212]: time="2025-05-10T00:44:35.513278074Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:44:35.513362 env[1212]: time="2025-05-10T00:44:35.513327866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513362 env[1212]: time="2025-05-10T00:44:35.513350127Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513464137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513488556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513510021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513529119Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513547284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513565020Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513585092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513604346Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:44:35.513897 env[1212]: time="2025-05-10T00:44:35.513623936Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514314949Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514344481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514365171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514383462Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514412627Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514428414Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514461665Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:44:35.514823 env[1212]: time="2025-05-10T00:44:35.514515919Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:44:35.515289 env[1212]: time="2025-05-10T00:44:35.514811833Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:44:35.515289 env[1212]: time="2025-05-10T00:44:35.514891293Z" level=info msg="Connect containerd service" May 10 00:44:35.515289 env[1212]: time="2025-05-10T00:44:35.514937638Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517189930Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517381001Z" level=info msg="Start subscribing containerd event" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517461435Z" level=info msg="Start recovering state" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517776687Z" level=info msg="Start event monitor" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517810304Z" level=info msg="Start snapshots syncer" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517827285Z" level=info msg="Start cni network conf syncer for default" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.517840696Z" level=info msg="Start streaming server" May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.518175747Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.518362092Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:44:35.541441 env[1212]: time="2025-05-10T00:44:35.518442159Z" level=info msg="containerd successfully booted in 1.116454s" May 10 00:44:35.541902 bash[1234]: Updated "/home/core/.ssh/authorized_keys" May 10 00:44:35.518585 systemd[1]: Started containerd.service. May 10 00:44:35.535776 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:44:35.648379 tar[1208]: linux-amd64/LICENSE May 10 00:44:35.648869 tar[1208]: linux-amd64/README.md May 10 00:44:35.654448 systemd[1]: Finished prepare-helm.service. May 10 00:44:36.416488 systemd[1]: Created slice system-sshd.slice. May 10 00:44:36.419079 systemd[1]: Started sshd@0-10.0.0.116:22-10.0.0.1:60950.service. May 10 00:44:36.479268 sshd[1262]: Accepted publickey for core from 10.0.0.1 port 60950 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:36.481675 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:36.494058 systemd-logind[1200]: New session 1 of user core. May 10 00:44:36.495273 systemd[1]: Created slice user-500.slice. May 10 00:44:36.498168 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:44:36.507700 systemd[1]: Started kubelet.service. May 10 00:44:36.522706 systemd[1]: Reached target multi-user.target. May 10 00:44:36.526715 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:44:36.536602 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:44:36.536924 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:44:36.580425 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:44:36.584137 systemd[1]: Starting user@500.service... May 10 00:44:36.587732 (systemd)[1269]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:36.695475 systemd[1269]: Queued start job for default target default.target. May 10 00:44:36.696086 systemd[1269]: Reached target paths.target. May 10 00:44:36.696110 systemd[1269]: Reached target sockets.target. May 10 00:44:36.696122 systemd[1269]: Reached target timers.target. May 10 00:44:36.696133 systemd[1269]: Reached target basic.target. May 10 00:44:36.696191 systemd[1269]: Reached target default.target. May 10 00:44:36.696215 systemd[1269]: Startup finished in 97ms. May 10 00:44:36.696318 systemd[1]: Started user@500.service. May 10 00:44:36.698452 systemd[1]: Started session-1.scope. May 10 00:44:36.699485 systemd[1]: Startup finished in 721ms (kernel) + 4.139s (initrd) + 8.786s (userspace) = 13.647s. May 10 00:44:36.775797 systemd[1]: Started sshd@1-10.0.0.116:22-10.0.0.1:60952.service. May 10 00:44:36.814216 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 60952 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:36.828976 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:36.833709 systemd-logind[1200]: New session 2 of user core. May 10 00:44:36.834632 systemd[1]: Started session-2.scope. May 10 00:44:36.938947 sshd[1283]: pam_unix(sshd:session): session closed for user core May 10 00:44:36.943484 systemd[1]: Started sshd@2-10.0.0.116:22-10.0.0.1:60960.service. May 10 00:44:36.944160 systemd[1]: sshd@1-10.0.0.116:22-10.0.0.1:60952.service: Deactivated successfully. May 10 00:44:36.944957 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:44:36.946508 systemd-logind[1200]: Session 2 logged out. Waiting for processes to exit. May 10 00:44:36.947883 systemd-logind[1200]: Removed session 2. May 10 00:44:36.977636 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 60960 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:36.982052 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:36.987482 systemd-logind[1200]: New session 3 of user core. May 10 00:44:36.988542 systemd[1]: Started session-3.scope. May 10 00:44:37.063288 sshd[1288]: pam_unix(sshd:session): session closed for user core May 10 00:44:37.067604 systemd[1]: Started sshd@3-10.0.0.116:22-10.0.0.1:60966.service. May 10 00:44:37.068192 systemd[1]: sshd@2-10.0.0.116:22-10.0.0.1:60960.service: Deactivated successfully. May 10 00:44:37.068814 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:44:37.069390 systemd-logind[1200]: Session 3 logged out. Waiting for processes to exit. May 10 00:44:37.070199 systemd-logind[1200]: Removed session 3. May 10 00:44:37.101049 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 60966 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:37.104413 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:37.109101 systemd-logind[1200]: New session 4 of user core. May 10 00:44:37.110320 systemd[1]: Started session-4.scope. May 10 00:44:37.174414 sshd[1295]: pam_unix(sshd:session): session closed for user core May 10 00:44:37.178033 systemd[1]: sshd@3-10.0.0.116:22-10.0.0.1:60966.service: Deactivated successfully. May 10 00:44:37.178778 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:44:37.179358 systemd-logind[1200]: Session 4 logged out. Waiting for processes to exit. May 10 00:44:37.181095 systemd[1]: Started sshd@4-10.0.0.116:22-10.0.0.1:60978.service. May 10 00:44:37.181903 systemd-logind[1200]: Removed session 4. May 10 00:44:37.213429 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 60978 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:37.225613 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:37.231524 systemd-logind[1200]: New session 5 of user core. May 10 00:44:37.232644 systemd[1]: Started session-5.scope. May 10 00:44:37.297935 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:44:37.298180 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:37.307998 dbus-daemon[1182]: \xd0=\xfd\xe1}U: received setenforce notice (enforcing=804353392) May 10 00:44:37.310801 sudo[1305]: pam_unix(sudo:session): session closed for user root May 10 00:44:37.313002 sshd[1302]: pam_unix(sshd:session): session closed for user core May 10 00:44:37.316703 systemd[1]: Started sshd@5-10.0.0.116:22-10.0.0.1:60986.service. May 10 00:44:37.317285 systemd[1]: sshd@4-10.0.0.116:22-10.0.0.1:60978.service: Deactivated successfully. May 10 00:44:37.317986 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:44:37.318756 systemd-logind[1200]: Session 5 logged out. Waiting for processes to exit. May 10 00:44:37.320331 systemd-logind[1200]: Removed session 5. May 10 00:44:37.352637 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 60986 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:37.382351 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:37.388585 systemd[1]: Started session-6.scope. May 10 00:44:37.388826 systemd-logind[1200]: New session 6 of user core. May 10 00:44:37.398926 kubelet[1267]: E0510 00:44:37.398858 1267 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:37.401033 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:37.401202 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:37.401522 systemd[1]: kubelet.service: Consumed 1.758s CPU time. May 10 00:44:37.481529 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:44:37.481814 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:37.484870 sudo[1313]: pam_unix(sudo:session): session closed for user root May 10 00:44:37.490483 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:44:37.490694 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:37.499641 systemd[1]: Stopping audit-rules.service... May 10 00:44:37.500000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:44:37.500000 audit[1316]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe00531800 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.500000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:44:37.502090 auditctl[1316]: No rules May 10 00:44:37.502473 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:44:37.502715 systemd[1]: Stopped audit-rules.service. May 10 00:44:37.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.505186 systemd[1]: Starting audit-rules.service... May 10 00:44:37.526458 augenrules[1333]: No rules May 10 00:44:37.527304 systemd[1]: Finished audit-rules.service. May 10 00:44:37.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.528272 sudo[1312]: pam_unix(sudo:session): session closed for user root May 10 00:44:37.527000 audit[1312]: USER_END pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:37.527000 audit[1312]: CRED_DISP pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:37.530035 sshd[1308]: pam_unix(sshd:session): session closed for user core May 10 00:44:37.530000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.530000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.534121 systemd[1]: sshd@5-10.0.0.116:22-10.0.0.1:60986.service: Deactivated successfully. May 10 00:44:37.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.116:22-10.0.0.1:60986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.534998 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:44:37.535667 systemd-logind[1200]: Session 6 logged out. Waiting for processes to exit. May 10 00:44:37.537102 systemd[1]: Started sshd@6-10.0.0.116:22-10.0.0.1:32770.service. May 10 00:44:37.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.116:22-10.0.0.1:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.538058 systemd-logind[1200]: Removed session 6. May 10 00:44:37.572000 audit[1339]: USER_ACCT pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.573388 sshd[1339]: Accepted publickey for core from 10.0.0.1 port 32770 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:44:37.573000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.573000 audit[1339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffc1e8cc0 a2=3 a3=0 items=0 ppid=1 pid=1339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:37.575049 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:37.579130 systemd-logind[1200]: New session 7 of user core. May 10 00:44:37.579935 systemd[1]: Started session-7.scope. May 10 00:44:37.583000 audit[1339]: USER_START pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.584000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.634000 audit[1342]: USER_ACCT pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:37.634000 audit[1342]: CRED_REFR pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:37.635317 sudo[1342]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:44:37.635569 sudo[1342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:37.636000 audit[1342]: USER_START pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:37.718287 systemd[1]: Starting docker.service... May 10 00:44:37.818084 env[1354]: time="2025-05-10T00:44:37.817919999Z" level=info msg="Starting up" May 10 00:44:37.819553 env[1354]: time="2025-05-10T00:44:37.819521458Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:44:37.819662 env[1354]: time="2025-05-10T00:44:37.819633368Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:44:37.819807 env[1354]: time="2025-05-10T00:44:37.819775110Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:44:37.819897 env[1354]: time="2025-05-10T00:44:37.819865142Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:44:37.823713 env[1354]: time="2025-05-10T00:44:37.823690663Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:44:37.823713 env[1354]: time="2025-05-10T00:44:37.823718223Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:44:37.823796 env[1354]: time="2025-05-10T00:44:37.823733144Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:44:37.823796 env[1354]: time="2025-05-10T00:44:37.823756464Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:44:39.979682 env[1354]: time="2025-05-10T00:44:39.979602038Z" level=info msg="Loading containers: start." May 10 00:44:40.035000 audit[1388]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.037016 kernel: kauditd_printk_skb: 48 callbacks suppressed May 10 00:44:40.037085 kernel: audit: type=1325 audit(1746837880.035:202): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.035000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcef4964b0 a2=0 a3=7ffcef49649c items=0 ppid=1354 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.043938 kernel: audit: type=1300 audit(1746837880.035:202): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcef4964b0 a2=0 a3=7ffcef49649c items=0 ppid=1354 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.043998 kernel: audit: type=1327 audit(1746837880.035:202): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:44:40.035000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:44:40.037000 audit[1390]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.048112 kernel: audit: type=1325 audit(1746837880.037:203): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.048153 kernel: audit: type=1300 audit(1746837880.037:203): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffffe7add00 a2=0 a3=7ffffe7adcec items=0 ppid=1354 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.037000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffffe7add00 a2=0 a3=7ffffe7adcec items=0 ppid=1354 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:44:40.054739 kernel: audit: type=1327 audit(1746837880.037:203): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:44:40.054787 kernel: audit: type=1325 audit(1746837880.039:204): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.039000 audit[1392]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.071515 kernel: audit: type=1300 audit(1746837880.039:204): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe93bf0700 a2=0 a3=7ffe93bf06ec items=0 ppid=1354 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.039000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe93bf0700 a2=0 a3=7ffe93bf06ec items=0 ppid=1354 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.076166 kernel: audit: type=1327 audit(1746837880.039:204): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:40.039000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:40.078740 kernel: audit: type=1325 audit(1746837880.040:205): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.040000 audit[1394]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.040000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd7d4717b0 a2=0 a3=7ffd7d47179c items=0 ppid=1354 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.040000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:40.043000 audit[1396]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.043000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0f7196a0 a2=0 a3=7ffd0f71968c items=0 ppid=1354 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:44:40.106000 audit[1401]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.106000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9408af30 a2=0 a3=7ffe9408af1c items=0 ppid=1354 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:44:40.265000 audit[1403]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.265000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff39c9ab80 a2=0 a3=7fff39c9ab6c items=0 ppid=1354 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.265000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:44:40.267000 audit[1405]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.267000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe4ddc7960 a2=0 a3=7ffe4ddc794c items=0 ppid=1354 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:44:40.270000 audit[1407]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.270000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff1f7ebb00 a2=0 a3=7fff1f7ebaec items=0 ppid=1354 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.270000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:40.285000 audit[1411]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.285000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcd5db9960 a2=0 a3=7ffcd5db994c items=0 ppid=1354 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.285000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:40.294000 audit[1412]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.294000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff575e6fb0 a2=0 a3=7fff575e6f9c items=0 ppid=1354 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:40.307774 kernel: Initializing XFRM netlink socket May 10 00:44:40.343931 env[1354]: time="2025-05-10T00:44:40.343882768Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:44:40.362000 audit[1420]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.362000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc562a7890 a2=0 a3=7ffc562a787c items=0 ppid=1354 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:44:40.373000 audit[1423]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.373000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe9437a9e0 a2=0 a3=7ffe9437a9cc items=0 ppid=1354 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:44:40.377000 audit[1426]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.377000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe57d6ec50 a2=0 a3=7ffe57d6ec3c items=0 ppid=1354 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.377000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:44:40.380000 audit[1428]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.380000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff5b5ab0d0 a2=0 a3=7fff5b5ab0bc items=0 ppid=1354 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.380000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:44:40.382000 audit[1430]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.382000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff24a7bb30 a2=0 a3=7fff24a7bb1c items=0 ppid=1354 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.382000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:44:40.385000 audit[1432]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.385000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff6f9537e0 a2=0 a3=7fff6f9537cc items=0 ppid=1354 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:44:40.387000 audit[1434]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.387000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeb753baa0 a2=0 a3=7ffeb753ba8c items=0 ppid=1354 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.387000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:44:40.396000 audit[1437]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.396000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc52eefa90 a2=0 a3=7ffc52eefa7c items=0 ppid=1354 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:44:40.399000 audit[1439]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.399000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd032b6b60 a2=0 a3=7ffd032b6b4c items=0 ppid=1354 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.399000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:40.401000 audit[1441]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.401000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffce5540450 a2=0 a3=7ffce554043c items=0 ppid=1354 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:40.403000 audit[1443]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.403000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc5c256c50 a2=0 a3=7ffc5c256c3c items=0 ppid=1354 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:44:40.404373 systemd-networkd[1022]: docker0: Link UP May 10 00:44:40.489000 audit[1447]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.489000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc5e0cf40 a2=0 a3=7ffdc5e0cf2c items=0 ppid=1354 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:40.496000 audit[1448]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:40.496000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec9e30b10 a2=0 a3=7ffec9e30afc items=0 ppid=1354 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:40.496000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:40.498343 env[1354]: time="2025-05-10T00:44:40.497725507Z" level=info msg="Loading containers: done." May 10 00:44:40.578645 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1805661859-merged.mount: Deactivated successfully. May 10 00:44:40.630680 env[1354]: time="2025-05-10T00:44:40.630584632Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:44:40.630931 env[1354]: time="2025-05-10T00:44:40.630904574Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:44:40.631076 env[1354]: time="2025-05-10T00:44:40.631046971Z" level=info msg="Daemon has completed initialization" May 10 00:44:40.656294 systemd[1]: Started docker.service. May 10 00:44:40.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:40.702489 env[1354]: time="2025-05-10T00:44:40.702419124Z" level=info msg="API listen on /run/docker.sock" May 10 00:44:41.593732 env[1212]: time="2025-05-10T00:44:41.593624879Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 10 00:44:42.321445 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount777301544.mount: Deactivated successfully. May 10 00:44:44.172654 env[1212]: time="2025-05-10T00:44:44.172584333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:44.174959 env[1212]: time="2025-05-10T00:44:44.174886101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:44.177818 env[1212]: time="2025-05-10T00:44:44.177781490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:44.181107 env[1212]: time="2025-05-10T00:44:44.181076416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:44.182011 env[1212]: time="2025-05-10T00:44:44.181972601Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 10 00:44:44.183880 env[1212]: time="2025-05-10T00:44:44.183823535Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 10 00:44:47.650180 env[1212]: time="2025-05-10T00:44:47.650102985Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:47.652283 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:44:47.652551 systemd[1]: Stopped kubelet.service. May 10 00:44:47.652624 systemd[1]: kubelet.service: Consumed 1.758s CPU time. May 10 00:44:47.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.654991 systemd[1]: Starting kubelet.service... May 10 00:44:47.660347 kernel: kauditd_printk_skb: 63 callbacks suppressed May 10 00:44:47.660544 kernel: audit: type=1130 audit(1746837887.650:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.669378 kernel: audit: type=1131 audit(1746837887.650:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.780256 systemd[1]: Started kubelet.service. May 10 00:44:47.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.784799 kernel: audit: type=1130 audit(1746837887.779:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:48.002937 env[1212]: time="2025-05-10T00:44:48.001651958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.008179 env[1212]: time="2025-05-10T00:44:48.008031239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.011130 env[1212]: time="2025-05-10T00:44:48.011073751Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.012518 env[1212]: time="2025-05-10T00:44:48.012463280Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 10 00:44:48.013399 env[1212]: time="2025-05-10T00:44:48.013352317Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 10 00:44:48.038895 kubelet[1493]: E0510 00:44:48.038797 1493 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:48.042052 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:48.042234 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:48.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:48.046787 kernel: audit: type=1131 audit(1746837888.041:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:50.047140 env[1212]: time="2025-05-10T00:44:50.047052400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:50.049522 env[1212]: time="2025-05-10T00:44:50.049473105Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:50.052154 env[1212]: time="2025-05-10T00:44:50.052092315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:50.053972 env[1212]: time="2025-05-10T00:44:50.053935106Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:50.054701 env[1212]: time="2025-05-10T00:44:50.054655689Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 10 00:44:50.055364 env[1212]: time="2025-05-10T00:44:50.055325255Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 00:44:51.906672 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3855874130.mount: Deactivated successfully. May 10 00:44:52.573742 env[1212]: time="2025-05-10T00:44:52.573672902Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.575987 env[1212]: time="2025-05-10T00:44:52.575914644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.577569 env[1212]: time="2025-05-10T00:44:52.577514256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.579962 env[1212]: time="2025-05-10T00:44:52.579925510Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.580371 env[1212]: time="2025-05-10T00:44:52.580344014Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 10 00:44:52.580973 env[1212]: time="2025-05-10T00:44:52.580941313Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:44:53.099148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount845000404.mount: Deactivated successfully. May 10 00:44:54.523147 env[1212]: time="2025-05-10T00:44:54.523080031Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:54.529193 env[1212]: time="2025-05-10T00:44:54.529142662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:54.535931 env[1212]: time="2025-05-10T00:44:54.535886215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:54.538526 env[1212]: time="2025-05-10T00:44:54.538471906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:54.539299 env[1212]: time="2025-05-10T00:44:54.539251325Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:44:54.539976 env[1212]: time="2025-05-10T00:44:54.539950154Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 00:44:55.773236 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3111843008.mount: Deactivated successfully. May 10 00:44:55.782978 env[1212]: time="2025-05-10T00:44:55.782900741Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.784957 env[1212]: time="2025-05-10T00:44:55.784925008Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.786652 env[1212]: time="2025-05-10T00:44:55.786614455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.789102 env[1212]: time="2025-05-10T00:44:55.789060399Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.789646 env[1212]: time="2025-05-10T00:44:55.789610227Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 00:44:55.790245 env[1212]: time="2025-05-10T00:44:55.790216057Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 10 00:44:57.333419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3629948693.mount: Deactivated successfully. May 10 00:44:58.293544 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:44:58.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.293820 systemd[1]: Stopped kubelet.service. May 10 00:44:58.295558 systemd[1]: Starting kubelet.service... May 10 00:44:58.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.302159 kernel: audit: type=1130 audit(1746837898.292:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.302237 kernel: audit: type=1131 audit(1746837898.292:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.377405 systemd[1]: Started kubelet.service. May 10 00:44:58.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.381747 kernel: audit: type=1130 audit(1746837898.376:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.419556 kubelet[1504]: E0510 00:44:58.419493 1504 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:58.421455 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:58.421620 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:58.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:58.425740 kernel: audit: type=1131 audit(1746837898.421:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:45:00.993873 env[1212]: time="2025-05-10T00:45:00.993777316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:00.996654 env[1212]: time="2025-05-10T00:45:00.996597679Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:00.998974 env[1212]: time="2025-05-10T00:45:00.998894333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.001377 env[1212]: time="2025-05-10T00:45:01.001326149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.002406 env[1212]: time="2025-05-10T00:45:01.002363420Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 10 00:45:03.821601 systemd[1]: Stopped kubelet.service. May 10 00:45:03.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.823987 systemd[1]: Starting kubelet.service... May 10 00:45:03.830548 kernel: audit: type=1130 audit(1746837903.821:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.830684 kernel: audit: type=1131 audit(1746837903.821:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.847830 systemd[1]: Reloading. May 10 00:45:03.924358 /usr/lib/systemd/system-generators/torcx-generator[1558]: time="2025-05-10T00:45:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:03.924397 /usr/lib/systemd/system-generators/torcx-generator[1558]: time="2025-05-10T00:45:03Z" level=info msg="torcx already run" May 10 00:45:04.314047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:04.314065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:04.332323 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404475 kernel: audit: type=1400 audit(1746837904.395:237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404536 kernel: audit: type=1400 audit(1746837904.395:238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404557 kernel: audit: type=1400 audit(1746837904.395:239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.407932 kernel: audit: type=1400 audit(1746837904.395:240): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424792 kernel: audit: type=1400 audit(1746837904.395:241): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424875 kernel: audit: type=1400 audit(1746837904.395:242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.446185 kernel: audit: type=1400 audit(1746837904.395:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.446308 kernel: audit: type=1400 audit(1746837904.395:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.400000 audit: BPF prog-id=40 op=LOAD May 10 00:45:04.400000 audit: BPF prog-id=34 op=UNLOAD May 10 00:45:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.403000 audit: BPF prog-id=41 op=LOAD May 10 00:45:04.403000 audit: BPF prog-id=33 op=UNLOAD May 10 00:45:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit: BPF prog-id=42 op=LOAD May 10 00:45:04.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit: BPF prog-id=43 op=LOAD May 10 00:45:04.424000 audit: BPF prog-id=24 op=UNLOAD May 10 00:45:04.424000 audit: BPF prog-id=25 op=UNLOAD May 10 00:45:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit: BPF prog-id=44 op=LOAD May 10 00:45:04.427000 audit: BPF prog-id=26 op=UNLOAD May 10 00:45:04.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.445000 audit: BPF prog-id=45 op=LOAD May 10 00:45:04.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.448000 audit: BPF prog-id=46 op=LOAD May 10 00:45:04.448000 audit: BPF prog-id=27 op=UNLOAD May 10 00:45:04.448000 audit: BPF prog-id=28 op=UNLOAD May 10 00:45:04.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit: BPF prog-id=47 op=LOAD May 10 00:45:04.451000 audit: BPF prog-id=35 op=UNLOAD May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit: BPF prog-id=48 op=LOAD May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit: BPF prog-id=49 op=LOAD May 10 00:45:04.451000 audit: BPF prog-id=36 op=UNLOAD May 10 00:45:04.451000 audit: BPF prog-id=37 op=UNLOAD May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit: BPF prog-id=50 op=LOAD May 10 00:45:04.452000 audit: BPF prog-id=29 op=UNLOAD May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit: BPF prog-id=51 op=LOAD May 10 00:45:04.452000 audit: BPF prog-id=30 op=UNLOAD May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit: BPF prog-id=52 op=LOAD May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit: BPF prog-id=53 op=LOAD May 10 00:45:04.453000 audit: BPF prog-id=31 op=UNLOAD May 10 00:45:04.453000 audit: BPF prog-id=32 op=UNLOAD May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.454000 audit: BPF prog-id=54 op=LOAD May 10 00:45:04.454000 audit: BPF prog-id=38 op=UNLOAD May 10 00:45:04.465399 systemd[1]: Started kubelet.service. May 10 00:45:04.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.466554 systemd[1]: Stopping kubelet.service... May 10 00:45:04.466832 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:45:04.466999 systemd[1]: Stopped kubelet.service. May 10 00:45:04.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.468315 systemd[1]: Starting kubelet.service... May 10 00:45:04.732543 systemd[1]: Started kubelet.service. May 10 00:45:04.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.854565 kubelet[1606]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:45:04.854565 kubelet[1606]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:45:04.854565 kubelet[1606]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:45:04.855093 kubelet[1606]: I0510 00:45:04.854665 1606 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:45:05.302221 kubelet[1606]: I0510 00:45:05.302151 1606 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 00:45:05.302221 kubelet[1606]: I0510 00:45:05.302196 1606 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:45:05.302518 kubelet[1606]: I0510 00:45:05.302472 1606 server.go:929] "Client rotation is on, will bootstrap in background" May 10 00:45:05.332997 kubelet[1606]: I0510 00:45:05.332903 1606 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:45:05.334754 kubelet[1606]: E0510 00:45:05.334448 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.116:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:05.343633 kubelet[1606]: E0510 00:45:05.343568 1606 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:45:05.343633 kubelet[1606]: I0510 00:45:05.343619 1606 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:45:05.350254 kubelet[1606]: I0510 00:45:05.350173 1606 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:45:05.354049 kubelet[1606]: I0510 00:45:05.353993 1606 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 00:45:05.354469 kubelet[1606]: I0510 00:45:05.354404 1606 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:45:05.354682 kubelet[1606]: I0510 00:45:05.354456 1606 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:45:05.354855 kubelet[1606]: I0510 00:45:05.354690 1606 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:45:05.354855 kubelet[1606]: I0510 00:45:05.354698 1606 container_manager_linux.go:300] "Creating device plugin manager" May 10 00:45:05.354934 kubelet[1606]: I0510 00:45:05.354903 1606 state_mem.go:36] "Initialized new in-memory state store" May 10 00:45:05.377810 kubelet[1606]: I0510 00:45:05.377739 1606 kubelet.go:408] "Attempting to sync node with API server" May 10 00:45:05.378003 kubelet[1606]: I0510 00:45:05.377832 1606 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:45:05.378003 kubelet[1606]: I0510 00:45:05.377962 1606 kubelet.go:314] "Adding apiserver pod source" May 10 00:45:05.378152 kubelet[1606]: I0510 00:45:05.378023 1606 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:45:05.382001 kubelet[1606]: W0510 00:45:05.381915 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:05.382183 kubelet[1606]: E0510 00:45:05.382150 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:05.382353 kubelet[1606]: W0510 00:45:05.382319 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:05.382454 kubelet[1606]: E0510 00:45:05.382431 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:05.384790 kubelet[1606]: I0510 00:45:05.384769 1606 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:45:05.389476 kubelet[1606]: I0510 00:45:05.389421 1606 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:45:05.391353 kubelet[1606]: W0510 00:45:05.391319 1606 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:45:05.392804 kubelet[1606]: I0510 00:45:05.392764 1606 server.go:1269] "Started kubelet" May 10 00:45:05.395893 kubelet[1606]: I0510 00:45:05.395790 1606 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:45:05.396495 kubelet[1606]: I0510 00:45:05.396395 1606 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:45:05.402938 kubelet[1606]: I0510 00:45:05.402846 1606 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:45:05.401000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:05.401000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006c8870 a1=c000baa048 a2=c0006c8840 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:05.401000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:05.401000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009109c0 a1=c000baa060 a2=c0006c8900 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:05.404134 kubelet[1606]: I0510 00:45:05.403509 1606 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:45:05.404134 kubelet[1606]: I0510 00:45:05.403554 1606 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:45:05.423042 kubelet[1606]: I0510 00:45:05.422970 1606 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:45:05.423921 kubelet[1606]: I0510 00:45:05.423883 1606 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 00:45:05.424140 kubelet[1606]: I0510 00:45:05.424120 1606 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 00:45:05.424331 kubelet[1606]: I0510 00:45:05.424302 1606 reconciler.go:26] "Reconciler: start to sync state" May 10 00:45:05.424597 kubelet[1606]: E0510 00:45:05.424559 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:05.425258 kubelet[1606]: W0510 00:45:05.425064 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:05.425258 kubelet[1606]: E0510 00:45:05.425139 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:05.425258 kubelet[1606]: I0510 00:45:05.425237 1606 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:45:05.426503 kubelet[1606]: E0510 00:45:05.426409 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="200ms" May 10 00:45:05.427925 kubelet[1606]: E0510 00:45:05.427908 1606 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:45:05.428558 kubelet[1606]: E0510 00:45:05.427016 1606 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.116:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.116:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e03d1df1ea3be default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 00:45:05.392706494 +0000 UTC m=+0.651374417,LastTimestamp:2025-05-10 00:45:05.392706494 +0000 UTC m=+0.651374417,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 00:45:05.428657 kubelet[1606]: I0510 00:45:05.428630 1606 server.go:460] "Adding debug handlers to kubelet server" May 10 00:45:05.428803 kubelet[1606]: I0510 00:45:05.428776 1606 factory.go:221] Registration of the containerd container factory successfully May 10 00:45:05.428803 kubelet[1606]: I0510 00:45:05.428800 1606 factory.go:221] Registration of the systemd container factory successfully May 10 00:45:05.428919 kubelet[1606]: I0510 00:45:05.428876 1606 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:45:05.427000 audit[1619]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.427000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd3b55f70 a2=0 a3=7ffdd3b55f5c items=0 ppid=1606 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:45:05.429000 audit[1620]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.429000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe37609190 a2=0 a3=7ffe3760917c items=0 ppid=1606 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:45:05.431000 audit[1623]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.431000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc07b2e40 a2=0 a3=7fffc07b2e2c items=0 ppid=1606 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:05.433000 audit[1625]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.433000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd26fda5a0 a2=0 a3=7ffd26fda58c items=0 ppid=1606 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:05.444596 kubelet[1606]: I0510 00:45:05.443880 1606 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:45:05.444596 kubelet[1606]: I0510 00:45:05.443903 1606 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:45:05.444596 kubelet[1606]: I0510 00:45:05.443939 1606 state_mem.go:36] "Initialized new in-memory state store" May 10 00:45:05.443000 audit[1630]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.443000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd8e899850 a2=0 a3=7ffd8e89983c items=0 ppid=1606 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:45:05.445952 kubelet[1606]: I0510 00:45:05.445782 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:45:05.445000 audit[1632]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:05.445000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd113c8290 a2=0 a3=7ffd113c827c items=0 ppid=1606 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:45:05.447435 kubelet[1606]: I0510 00:45:05.447286 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:45:05.447435 kubelet[1606]: I0510 00:45:05.447343 1606 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:45:05.447435 kubelet[1606]: I0510 00:45:05.447388 1606 kubelet.go:2321] "Starting kubelet main sync loop" May 10 00:45:05.447550 kubelet[1606]: E0510 00:45:05.447445 1606 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:45:05.446000 audit[1633]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.446000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd60626fd0 a2=0 a3=7ffd60626fbc items=0 ppid=1606 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:45:05.448107 kubelet[1606]: W0510 00:45:05.448060 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:05.448154 kubelet[1606]: E0510 00:45:05.448099 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:05.447000 audit[1634]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:05.447000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd38f71ce0 a2=0 a3=7ffd38f71ccc items=0 ppid=1606 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:45:05.447000 audit[1635]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.447000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7d9d97f0 a2=0 a3=7ffe7d9d97dc items=0 ppid=1606 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:45:05.449000 audit[1637]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:05.449000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa6d37840 a2=0 a3=7fffa6d3782c items=0 ppid=1606 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:45:05.449000 audit[1636]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:05.449000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe01531210 a2=0 a3=7ffe015311fc items=0 ppid=1606 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:45:05.450000 audit[1638]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:05.450000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb749bb50 a2=0 a3=7ffcb749bb3c items=0 ppid=1606 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.450000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:45:05.524848 kubelet[1606]: E0510 00:45:05.524745 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:05.548438 kubelet[1606]: E0510 00:45:05.548269 1606 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:05.626110 kubelet[1606]: E0510 00:45:05.625864 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:05.627816 kubelet[1606]: E0510 00:45:05.627740 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="400ms" May 10 00:45:05.726102 kubelet[1606]: E0510 00:45:05.726022 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:05.749394 kubelet[1606]: E0510 00:45:05.749304 1606 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:05.827032 kubelet[1606]: E0510 00:45:05.826976 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:05.927665 kubelet[1606]: E0510 00:45:05.927461 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.028335 kubelet[1606]: E0510 00:45:06.028210 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.028658 kubelet[1606]: E0510 00:45:06.028587 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="800ms" May 10 00:45:06.129245 kubelet[1606]: E0510 00:45:06.129156 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.150431 kubelet[1606]: E0510 00:45:06.150357 1606 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:45:06.230231 kubelet[1606]: E0510 00:45:06.230058 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.312555 kubelet[1606]: I0510 00:45:06.312500 1606 policy_none.go:49] "None policy: Start" May 10 00:45:06.313745 kubelet[1606]: I0510 00:45:06.313704 1606 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:45:06.313830 kubelet[1606]: I0510 00:45:06.313765 1606 state_mem.go:35] "Initializing new in-memory state store" May 10 00:45:06.330379 kubelet[1606]: E0510 00:45:06.330319 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.371514 kubelet[1606]: W0510 00:45:06.371437 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:06.371736 kubelet[1606]: E0510 00:45:06.371527 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:06.430953 kubelet[1606]: E0510 00:45:06.430901 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.457992 kubelet[1606]: W0510 00:45:06.457924 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:06.458072 kubelet[1606]: E0510 00:45:06.458001 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:06.531796 kubelet[1606]: E0510 00:45:06.531603 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:06.613451 systemd[1]: Created slice kubepods.slice. May 10 00:45:06.618549 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:45:06.620750 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:45:06.627533 kubelet[1606]: I0510 00:45:06.627496 1606 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:45:06.625000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:06.625000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:06.625000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e45d10 a1=c000763d10 a2=c000e45ce0 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:06.625000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:06.627886 kubelet[1606]: I0510 00:45:06.627587 1606 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:45:06.627886 kubelet[1606]: I0510 00:45:06.627741 1606 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:45:06.627886 kubelet[1606]: I0510 00:45:06.627761 1606 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:45:06.628152 kubelet[1606]: I0510 00:45:06.628125 1606 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:45:06.629719 kubelet[1606]: E0510 00:45:06.629676 1606 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 10 00:45:06.695371 kubelet[1606]: W0510 00:45:06.695256 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:06.695371 kubelet[1606]: E0510 00:45:06.695360 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:06.730187 kubelet[1606]: I0510 00:45:06.730143 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:06.730511 kubelet[1606]: E0510 00:45:06.730486 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" May 10 00:45:06.829693 kubelet[1606]: E0510 00:45:06.829551 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="1.6s" May 10 00:45:06.834059 kubelet[1606]: W0510 00:45:06.834026 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:06.834109 kubelet[1606]: E0510 00:45:06.834067 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:06.932365 kubelet[1606]: I0510 00:45:06.932322 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:06.932772 kubelet[1606]: E0510 00:45:06.932667 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" May 10 00:45:06.959946 systemd[1]: Created slice kubepods-burstable-pod95cba58f4d04e6e9265a027b53c1c61e.slice. May 10 00:45:06.979015 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 10 00:45:06.993299 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 10 00:45:07.033522 kubelet[1606]: I0510 00:45:07.033377 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:07.033522 kubelet[1606]: I0510 00:45:07.033442 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 10 00:45:07.033522 kubelet[1606]: I0510 00:45:07.033518 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/95cba58f4d04e6e9265a027b53c1c61e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"95cba58f4d04e6e9265a027b53c1c61e\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:07.033522 kubelet[1606]: I0510 00:45:07.033547 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/95cba58f4d04e6e9265a027b53c1c61e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"95cba58f4d04e6e9265a027b53c1c61e\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:07.033903 kubelet[1606]: I0510 00:45:07.033571 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:07.033903 kubelet[1606]: I0510 00:45:07.033594 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:07.033903 kubelet[1606]: I0510 00:45:07.033614 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/95cba58f4d04e6e9265a027b53c1c61e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"95cba58f4d04e6e9265a027b53c1c61e\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:07.033903 kubelet[1606]: I0510 00:45:07.033635 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:07.033903 kubelet[1606]: I0510 00:45:07.033656 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:07.277947 kubelet[1606]: E0510 00:45:07.277558 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:07.278749 env[1212]: time="2025-05-10T00:45:07.278667752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:95cba58f4d04e6e9265a027b53c1c61e,Namespace:kube-system,Attempt:0,}" May 10 00:45:07.281133 kubelet[1606]: E0510 00:45:07.281113 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:07.281725 env[1212]: time="2025-05-10T00:45:07.281657101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 10 00:45:07.296209 kubelet[1606]: E0510 00:45:07.296152 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:07.297085 env[1212]: time="2025-05-10T00:45:07.296962056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 10 00:45:07.362724 kubelet[1606]: I0510 00:45:07.362670 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:07.363126 kubelet[1606]: E0510 00:45:07.363080 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" May 10 00:45:07.464066 kubelet[1606]: E0510 00:45:07.463989 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.116:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:07.964263 kubelet[1606]: E0510 00:45:07.964093 1606 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.116:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.116:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e03d1df1ea3be default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 00:45:05.392706494 +0000 UTC m=+0.651374417,LastTimestamp:2025-05-10 00:45:05.392706494 +0000 UTC m=+0.651374417,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 00:45:07.996076 kubelet[1606]: W0510 00:45:07.995993 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:07.996300 kubelet[1606]: E0510 00:45:07.996085 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:08.164839 kubelet[1606]: I0510 00:45:08.164799 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:08.165563 kubelet[1606]: E0510 00:45:08.165518 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" May 10 00:45:08.430215 kubelet[1606]: E0510 00:45:08.430072 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="3.2s" May 10 00:45:08.826351 kubelet[1606]: W0510 00:45:08.826162 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:08.826351 kubelet[1606]: E0510 00:45:08.826255 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:09.148656 kubelet[1606]: W0510 00:45:09.148344 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:09.148656 kubelet[1606]: E0510 00:45:09.148472 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:09.738922 kubelet[1606]: W0510 00:45:09.738789 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused May 10 00:45:09.738922 kubelet[1606]: E0510 00:45:09.738880 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:09.767933 kubelet[1606]: I0510 00:45:09.767896 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:09.768399 kubelet[1606]: E0510 00:45:09.768366 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" May 10 00:45:09.855989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount680053172.mount: Deactivated successfully. May 10 00:45:11.087748 env[1212]: time="2025-05-10T00:45:11.087632668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.249252 env[1212]: time="2025-05-10T00:45:11.249171722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.278366 env[1212]: time="2025-05-10T00:45:11.278304887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.312785 env[1212]: time="2025-05-10T00:45:11.312702006Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.353800 env[1212]: time="2025-05-10T00:45:11.353371348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.355990 env[1212]: time="2025-05-10T00:45:11.355916946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.359485 env[1212]: time="2025-05-10T00:45:11.359402976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.361084 env[1212]: time="2025-05-10T00:45:11.361043863Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.363181 env[1212]: time="2025-05-10T00:45:11.363123464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.366351 env[1212]: time="2025-05-10T00:45:11.366319330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.371940 env[1212]: time="2025-05-10T00:45:11.371866317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.380953 env[1212]: time="2025-05-10T00:45:11.380883521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:11.430313 env[1212]: time="2025-05-10T00:45:11.430177190Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:11.430313 env[1212]: time="2025-05-10T00:45:11.430260430Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:11.430313 env[1212]: time="2025-05-10T00:45:11.430275753Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:11.430904 env[1212]: time="2025-05-10T00:45:11.430833565Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b22b6ea48621ff4067ed385e993973ce7d1e5f58d223bfe08fb1f8dfea51d320 pid=1648 runtime=io.containerd.runc.v2 May 10 00:45:11.437153 env[1212]: time="2025-05-10T00:45:11.433436933Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:11.437153 env[1212]: time="2025-05-10T00:45:11.433522089Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:11.437153 env[1212]: time="2025-05-10T00:45:11.433583098Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:11.437153 env[1212]: time="2025-05-10T00:45:11.433811209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/816ecceb6e9283207da4f54e2d0aea0ad7a1cb22791437305f446f1ca81ddb47 pid=1671 runtime=io.containerd.runc.v2 May 10 00:45:11.440346 env[1212]: time="2025-05-10T00:45:11.440258114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:11.440346 env[1212]: time="2025-05-10T00:45:11.440300492Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:11.440346 env[1212]: time="2025-05-10T00:45:11.440310780Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:11.440847 env[1212]: time="2025-05-10T00:45:11.440673413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a915cd573b4b80f05631432729c94c7e8da15d5a21743cc5a7ccbe0fd66765b pid=1668 runtime=io.containerd.runc.v2 May 10 00:45:11.458680 systemd[1]: Started cri-containerd-816ecceb6e9283207da4f54e2d0aea0ad7a1cb22791437305f446f1ca81ddb47.scope. May 10 00:45:11.470483 systemd[1]: Started cri-containerd-9a915cd573b4b80f05631432729c94c7e8da15d5a21743cc5a7ccbe0fd66765b.scope. May 10 00:45:11.484612 systemd[1]: Started cri-containerd-b22b6ea48621ff4067ed385e993973ce7d1e5f58d223bfe08fb1f8dfea51d320.scope. May 10 00:45:11.538873 kernel: kauditd_printk_skb: 221 callbacks suppressed May 10 00:45:11.539028 kernel: audit: type=1400 audit(1746837911.532:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.539055 kernel: audit: type=1400 audit(1746837911.532:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.544594 kernel: audit: type=1400 audit(1746837911.532:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.551179 kernel: audit: type=1400 audit(1746837911.532:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.551237 kernel: audit: type=1400 audit(1746837911.532:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.554430 kernel: audit: type=1400 audit(1746837911.532:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.558029 kernel: audit: type=1400 audit(1746837911.532:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.561725 kernel: audit: type=1400 audit(1746837911.532:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.565318 kernel: audit: type=1400 audit(1746837911.532:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.582000 audit: BPF prog-id=55 op=LOAD May 10 00:45:11.583000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588763 kernel: audit: type=1400 audit(1746837911.582:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393135636435373362346238306630353633313433323732396339 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393135636435373362346238306630353633313433323732396339 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.583000 audit: BPF prog-id=56 op=LOAD May 10 00:45:11.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit: BPF prog-id=57 op=LOAD May 10 00:45:11.583000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00019e160 items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393135636435373362346238306630353633313433323732396339 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit: BPF prog-id=58 op=LOAD May 10 00:45:11.586000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00019e1a8 items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393135636435373362346238306630353633313433323732396339 May 10 00:45:11.586000 audit: BPF prog-id=58 op=UNLOAD May 10 00:45:11.586000 audit: BPF prog-id=56 op=UNLOAD May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1648 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.586000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326236656134383632316666343036376564333835653939333937 May 10 00:45:11.586000 audit: BPF prog-id=59 op=LOAD May 10 00:45:11.587000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.586000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00019e5b8 items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393135636435373362346238306630353633313433323732396339 May 10 00:45:11.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: BPF prog-id=60 op=LOAD May 10 00:45:11.587000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1648 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326236656134383632316666343036376564333835653939333937 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: BPF prog-id=61 op=LOAD May 10 00:45:11.589000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6240 items=0 ppid=1648 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326236656134383632316666343036376564333835653939333937 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: BPF prog-id=62 op=LOAD May 10 00:45:11.589000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6288 items=0 ppid=1648 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326236656134383632316666343036376564333835653939333937 May 10 00:45:11.589000 audit: BPF prog-id=62 op=UNLOAD May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: BPF prog-id=61 op=UNLOAD May 10 00:45:11.589000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1671 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366563636562366539323833323037646134663534653264306165 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1671 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366563636562366539323833323037646134663534653264306165 May 10 00:45:11.589000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: BPF prog-id=64 op=LOAD May 10 00:45:11.589000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034bce0 items=0 ppid=1671 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366563636562366539323833323037646134663534653264306165 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.589000 audit: BPF prog-id=65 op=LOAD May 10 00:45:11.589000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034bd28 items=0 ppid=1671 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366563636562366539323833323037646134663534653264306165 May 10 00:45:11.590000 audit: BPF prog-id=65 op=UNLOAD May 10 00:45:11.590000 audit: BPF prog-id=64 op=UNLOAD May 10 00:45:11.590000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.590000 audit: BPF prog-id=66 op=LOAD May 10 00:45:11.590000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce138 items=0 ppid=1671 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366563636562366539323833323037646134663534653264306165 May 10 00:45:11.589000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c6698 items=0 ppid=1648 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326236656134383632316666343036376564333835653939333937 May 10 00:45:11.624589 env[1212]: time="2025-05-10T00:45:11.621367851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:95cba58f4d04e6e9265a027b53c1c61e,Namespace:kube-system,Attempt:0,} returns sandbox id \"b22b6ea48621ff4067ed385e993973ce7d1e5f58d223bfe08fb1f8dfea51d320\"" May 10 00:45:11.624734 kubelet[1606]: E0510 00:45:11.622747 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:11.625453 env[1212]: time="2025-05-10T00:45:11.625419272Z" level=info msg="CreateContainer within sandbox \"b22b6ea48621ff4067ed385e993973ce7d1e5f58d223bfe08fb1f8dfea51d320\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:45:11.628496 env[1212]: time="2025-05-10T00:45:11.628461394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"9a915cd573b4b80f05631432729c94c7e8da15d5a21743cc5a7ccbe0fd66765b\"" May 10 00:45:11.629745 kubelet[1606]: E0510 00:45:11.629629 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:11.630534 kubelet[1606]: E0510 00:45:11.630494 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="6.4s" May 10 00:45:11.633451 env[1212]: time="2025-05-10T00:45:11.633422241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"816ecceb6e9283207da4f54e2d0aea0ad7a1cb22791437305f446f1ca81ddb47\"" May 10 00:45:11.634143 env[1212]: time="2025-05-10T00:45:11.634112810Z" level=info msg="CreateContainer within sandbox \"9a915cd573b4b80f05631432729c94c7e8da15d5a21743cc5a7ccbe0fd66765b\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:45:11.634606 kubelet[1606]: E0510 00:45:11.634426 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:11.636590 env[1212]: time="2025-05-10T00:45:11.636542038Z" level=info msg="CreateContainer within sandbox \"816ecceb6e9283207da4f54e2d0aea0ad7a1cb22791437305f446f1ca81ddb47\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:45:11.674704 kubelet[1606]: E0510 00:45:11.674633 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.116:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:45:11.860435 env[1212]: time="2025-05-10T00:45:11.860346586Z" level=info msg="CreateContainer within sandbox \"b22b6ea48621ff4067ed385e993973ce7d1e5f58d223bfe08fb1f8dfea51d320\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f6637ecc87aa7d1e43e0365d6e93a64f6bea9639eb20d54b338566c7ac9a10f0\"" May 10 00:45:11.861365 env[1212]: time="2025-05-10T00:45:11.861317662Z" level=info msg="StartContainer for \"f6637ecc87aa7d1e43e0365d6e93a64f6bea9639eb20d54b338566c7ac9a10f0\"" May 10 00:45:11.875684 env[1212]: time="2025-05-10T00:45:11.875117630Z" level=info msg="CreateContainer within sandbox \"9a915cd573b4b80f05631432729c94c7e8da15d5a21743cc5a7ccbe0fd66765b\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"41c41f666cad404656d5edd790e288144a99a2cc2409ca5b8ff3089da1f01ea3\"" May 10 00:45:11.876105 env[1212]: time="2025-05-10T00:45:11.876057829Z" level=info msg="StartContainer for \"41c41f666cad404656d5edd790e288144a99a2cc2409ca5b8ff3089da1f01ea3\"" May 10 00:45:11.881959 systemd[1]: Started cri-containerd-f6637ecc87aa7d1e43e0365d6e93a64f6bea9639eb20d54b338566c7ac9a10f0.scope. May 10 00:45:11.883801 env[1212]: time="2025-05-10T00:45:11.883738967Z" level=info msg="CreateContainer within sandbox \"816ecceb6e9283207da4f54e2d0aea0ad7a1cb22791437305f446f1ca81ddb47\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b52d71396cf4f9bd5fb730b818c4ac1564445b84dcf56d3e1da9f18e77845a73\"" May 10 00:45:11.884512 env[1212]: time="2025-05-10T00:45:11.884488871Z" level=info msg="StartContainer for \"b52d71396cf4f9bd5fb730b818c4ac1564445b84dcf56d3e1da9f18e77845a73\"" May 10 00:45:11.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.896000 audit: BPF prog-id=67 op=LOAD May 10 00:45:11.897000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.897000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1648 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636363337656363383761613764316534336530333635643665393361 May 10 00:45:11.897000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.897000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1648 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636363337656363383761613764316534336530333635643665393361 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit: BPF prog-id=68 op=LOAD May 10 00:45:11.898000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c5df0 items=0 ppid=1648 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636363337656363383761613764316534336530333635643665393361 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit: BPF prog-id=69 op=LOAD May 10 00:45:11.898000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c5e38 items=0 ppid=1648 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636363337656363383761613764316534336530333635643665393361 May 10 00:45:11.898000 audit: BPF prog-id=69 op=UNLOAD May 10 00:45:11.898000 audit: BPF prog-id=68 op=UNLOAD May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.898000 audit: BPF prog-id=70 op=LOAD May 10 00:45:11.898000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00040c248 items=0 ppid=1648 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636363337656363383761613764316534336530333635643665393361 May 10 00:45:11.900409 systemd[1]: Started cri-containerd-41c41f666cad404656d5edd790e288144a99a2cc2409ca5b8ff3089da1f01ea3.scope. May 10 00:45:11.907265 systemd[1]: Started cri-containerd-b52d71396cf4f9bd5fb730b818c4ac1564445b84dcf56d3e1da9f18e77845a73.scope. May 10 00:45:11.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.928000 audit: BPF prog-id=71 op=LOAD May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633431663636366361643430343635366435656464373930653238 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633431663636366361643430343635366435656464373930653238 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit: BPF prog-id=72 op=LOAD May 10 00:45:11.929000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00029c610 items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633431663636366361643430343635366435656464373930653238 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit: BPF prog-id=73 op=LOAD May 10 00:45:11.929000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00029c658 items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633431663636366361643430343635366435656464373930653238 May 10 00:45:11.929000 audit: BPF prog-id=73 op=UNLOAD May 10 00:45:11.929000 audit: BPF prog-id=72 op=UNLOAD May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.929000 audit: BPF prog-id=74 op=LOAD May 10 00:45:11.929000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00029ca68 items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633431663636366361643430343635366435656464373930653238 May 10 00:45:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit: BPF prog-id=75 op=LOAD May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1671 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326437313339366366346639626435666237333062383138633461 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1671 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326437313339366366346639626435666237333062383138633461 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit: BPF prog-id=76 op=LOAD May 10 00:45:11.937000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025660 items=0 ppid=1671 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326437313339366366346639626435666237333062383138633461 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.937000 audit: BPF prog-id=77 op=LOAD May 10 00:45:11.937000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000256a8 items=0 ppid=1671 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326437313339366366346639626435666237333062383138633461 May 10 00:45:11.938000 audit: BPF prog-id=77 op=UNLOAD May 10 00:45:11.938000 audit: BPF prog-id=76 op=UNLOAD May 10 00:45:11.938000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:11.938000 audit: BPF prog-id=78 op=LOAD May 10 00:45:11.938000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000025ab8 items=0 ppid=1671 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:11.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326437313339366366346639626435666237333062383138633461 May 10 00:45:12.007097 env[1212]: time="2025-05-10T00:45:12.007020805Z" level=info msg="StartContainer for \"f6637ecc87aa7d1e43e0365d6e93a64f6bea9639eb20d54b338566c7ac9a10f0\" returns successfully" May 10 00:45:12.008457 env[1212]: time="2025-05-10T00:45:12.008394870Z" level=info msg="StartContainer for \"41c41f666cad404656d5edd790e288144a99a2cc2409ca5b8ff3089da1f01ea3\" returns successfully" May 10 00:45:12.008457 env[1212]: time="2025-05-10T00:45:12.008396053Z" level=info msg="StartContainer for \"b52d71396cf4f9bd5fb730b818c4ac1564445b84dcf56d3e1da9f18e77845a73\" returns successfully" May 10 00:45:12.469322 kubelet[1606]: E0510 00:45:12.469269 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:12.471071 kubelet[1606]: E0510 00:45:12.471043 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:12.472871 kubelet[1606]: E0510 00:45:12.472842 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:12.583000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:12.583000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000494980 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:12.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:12.583000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:12.583000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000d107b0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:12.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:12.970105 kubelet[1606]: I0510 00:45:12.969966 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:13.475407 kubelet[1606]: E0510 00:45:13.475362 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:13.513000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:13.513000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004385230 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:45:13.513000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:13.513000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:13.513000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005c2c2c0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:45:13.513000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:13.514000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:13.514000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0043852c0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:45:13.514000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:13.515000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:13.515000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0043854d0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:45:13.515000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:13.515000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:13.515000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c007eef640 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:45:13.515000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:13.515000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:13.515000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c005eb8450 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:45:13.515000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:45:13.771286 kubelet[1606]: I0510 00:45:13.771131 1606 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 10 00:45:13.771286 kubelet[1606]: E0510 00:45:13.771183 1606 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 10 00:45:13.976850 kubelet[1606]: E0510 00:45:13.976812 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:13.981044 kubelet[1606]: E0510 00:45:13.981009 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:14.081788 kubelet[1606]: E0510 00:45:14.081615 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:14.182380 kubelet[1606]: E0510 00:45:14.182289 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:14.283308 kubelet[1606]: E0510 00:45:14.283214 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:14.385742 kubelet[1606]: I0510 00:45:14.385566 1606 apiserver.go:52] "Watching apiserver" May 10 00:45:14.425026 kubelet[1606]: I0510 00:45:14.424977 1606 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 00:45:17.331000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:45:17.333744 kernel: kauditd_printk_skb: 366 callbacks suppressed May 10 00:45:17.333821 kernel: audit: type=1400 audit(1746837917.331:540): avc: denied { watch } for pid=1832 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:45:17.331000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d4a940 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:17.345992 kernel: audit: type=1300 audit(1746837917.331:540): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d4a940 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:17.331000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:17.352793 kernel: audit: type=1327 audit(1746837917.331:540): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.157000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.157000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.167306 kernel: audit: type=1400 audit(1746837918.157:541): avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.167455 kernel: audit: type=1400 audit(1746837918.157:542): avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.167487 kernel: audit: type=1300 audit(1746837918.157:542): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bf11e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:18.157000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bf11e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:18.157000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.157000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bf11c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:18.199237 kernel: audit: type=1327 audit(1746837918.157:542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.199391 kernel: audit: type=1300 audit(1746837918.157:541): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bf11c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:18.199424 kernel: audit: type=1327 audit(1746837918.157:541): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.157000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.191000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.209195 kernel: audit: type=1400 audit(1746837918.191:543): avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.191000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bf12a0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:18.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.198000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:18.198000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bf1460 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:45:18.198000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:18.216979 systemd[1]: Reloading. May 10 00:45:18.299864 /usr/lib/systemd/system-generators/torcx-generator[1905]: time="2025-05-10T00:45:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:18.300483 /usr/lib/systemd/system-generators/torcx-generator[1905]: time="2025-05-10T00:45:18Z" level=info msg="torcx already run" May 10 00:45:18.405114 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:18.405133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:18.423530 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.513000 audit: BPF prog-id=79 op=LOAD May 10 00:45:18.513000 audit: BPF prog-id=57 op=UNLOAD May 10 00:45:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.515000 audit: BPF prog-id=80 op=LOAD May 10 00:45:18.515000 audit: BPF prog-id=40 op=UNLOAD May 10 00:45:18.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.517000 audit: BPF prog-id=81 op=LOAD May 10 00:45:18.517000 audit: BPF prog-id=41 op=UNLOAD May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit: BPF prog-id=82 op=LOAD May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit: BPF prog-id=83 op=LOAD May 10 00:45:18.518000 audit: BPF prog-id=42 op=UNLOAD May 10 00:45:18.518000 audit: BPF prog-id=43 op=UNLOAD May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit: BPF prog-id=84 op=LOAD May 10 00:45:18.518000 audit: BPF prog-id=44 op=UNLOAD May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit: BPF prog-id=85 op=LOAD May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit: BPF prog-id=86 op=LOAD May 10 00:45:18.519000 audit: BPF prog-id=45 op=UNLOAD May 10 00:45:18.519000 audit: BPF prog-id=46 op=UNLOAD May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.519000 audit: BPF prog-id=87 op=LOAD May 10 00:45:18.520000 audit: BPF prog-id=75 op=UNLOAD May 10 00:45:18.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.521000 audit: BPF prog-id=88 op=LOAD May 10 00:45:18.521000 audit: BPF prog-id=60 op=UNLOAD May 10 00:45:18.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.522000 audit: BPF prog-id=89 op=LOAD May 10 00:45:18.522000 audit: BPF prog-id=55 op=UNLOAD May 10 00:45:18.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.524000 audit: BPF prog-id=90 op=LOAD May 10 00:45:18.524000 audit: BPF prog-id=71 op=UNLOAD May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit: BPF prog-id=91 op=LOAD May 10 00:45:18.525000 audit: BPF prog-id=47 op=UNLOAD May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit: BPF prog-id=92 op=LOAD May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.525000 audit: BPF prog-id=93 op=LOAD May 10 00:45:18.525000 audit: BPF prog-id=48 op=UNLOAD May 10 00:45:18.525000 audit: BPF prog-id=49 op=UNLOAD May 10 00:45:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.526000 audit: BPF prog-id=94 op=LOAD May 10 00:45:18.526000 audit: BPF prog-id=50 op=UNLOAD May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit: BPF prog-id=95 op=LOAD May 10 00:45:18.527000 audit: BPF prog-id=51 op=UNLOAD May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit: BPF prog-id=96 op=LOAD May 10 00:45:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.528000 audit: BPF prog-id=97 op=LOAD May 10 00:45:18.528000 audit: BPF prog-id=52 op=UNLOAD May 10 00:45:18.528000 audit: BPF prog-id=53 op=UNLOAD May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit: BPF prog-id=98 op=LOAD May 10 00:45:18.529000 audit: BPF prog-id=54 op=UNLOAD May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.529000 audit: BPF prog-id=99 op=LOAD May 10 00:45:18.529000 audit: BPF prog-id=67 op=UNLOAD May 10 00:45:18.542264 systemd[1]: Stopping kubelet.service... May 10 00:45:18.574146 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:45:18.574376 systemd[1]: Stopped kubelet.service. May 10 00:45:18.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.574444 systemd[1]: kubelet.service: Consumed 1.312s CPU time. May 10 00:45:18.576507 systemd[1]: Starting kubelet.service... May 10 00:45:18.672309 systemd[1]: Started kubelet.service. May 10 00:45:18.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.715908 kubelet[1950]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:45:18.715908 kubelet[1950]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:45:18.715908 kubelet[1950]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:45:18.716369 kubelet[1950]: I0510 00:45:18.715887 1950 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:45:18.722575 kubelet[1950]: I0510 00:45:18.722536 1950 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 00:45:18.722575 kubelet[1950]: I0510 00:45:18.722560 1950 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:45:18.722893 kubelet[1950]: I0510 00:45:18.722864 1950 server.go:929] "Client rotation is on, will bootstrap in background" May 10 00:45:18.724108 kubelet[1950]: I0510 00:45:18.724085 1950 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:45:18.766974 kubelet[1950]: I0510 00:45:18.766921 1950 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:45:18.770060 kubelet[1950]: E0510 00:45:18.770030 1950 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:45:18.770139 kubelet[1950]: I0510 00:45:18.770061 1950 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:45:18.773840 kubelet[1950]: I0510 00:45:18.773802 1950 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:45:18.773949 kubelet[1950]: I0510 00:45:18.773929 1950 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 00:45:18.774130 kubelet[1950]: I0510 00:45:18.774090 1950 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:45:18.774342 kubelet[1950]: I0510 00:45:18.774121 1950 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:45:18.774466 kubelet[1950]: I0510 00:45:18.774344 1950 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:45:18.774466 kubelet[1950]: I0510 00:45:18.774358 1950 container_manager_linux.go:300] "Creating device plugin manager" May 10 00:45:18.774466 kubelet[1950]: I0510 00:45:18.774396 1950 state_mem.go:36] "Initialized new in-memory state store" May 10 00:45:18.774579 kubelet[1950]: I0510 00:45:18.774498 1950 kubelet.go:408] "Attempting to sync node with API server" May 10 00:45:18.774579 kubelet[1950]: I0510 00:45:18.774515 1950 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:45:18.774579 kubelet[1950]: I0510 00:45:18.774546 1950 kubelet.go:314] "Adding apiserver pod source" May 10 00:45:18.774579 kubelet[1950]: I0510 00:45:18.774571 1950 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:45:18.775167 kubelet[1950]: I0510 00:45:18.775138 1950 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:45:18.779000 audit[1950]: AVC avc: denied { mac_admin } for pid=1950 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.779000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:18.779000 audit[1950]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2cfc0 a1=c0009b8ae0 a2=c000c2cf90 a3=25 items=0 ppid=1 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:18.779000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:18.779000 audit[1950]: AVC avc: denied { mac_admin } for pid=1950 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.779000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:18.779000 audit[1950]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009b6c40 a1=c0009b8af8 a2=c000c2d050 a3=25 items=0 ppid=1 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:18.779000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.776152 1950 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.776989 1950 server.go:1269] "Started kubelet" May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.777162 1950 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.777277 1950 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.777526 1950 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.779349 1950 server.go:460] "Adding debug handlers to kubelet server" May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.779863 1950 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.779921 1950 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:45:18.781093 kubelet[1950]: I0510 00:45:18.779947 1950 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:45:18.790745 kubelet[1950]: I0510 00:45:18.790696 1950 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 00:45:18.791150 kubelet[1950]: I0510 00:45:18.791130 1950 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:45:18.791896 kubelet[1950]: E0510 00:45:18.791807 1950 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:45:18.793104 kubelet[1950]: I0510 00:45:18.793068 1950 reconciler.go:26] "Reconciler: start to sync state" May 10 00:45:18.793187 kubelet[1950]: I0510 00:45:18.793120 1950 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 00:45:18.793786 kubelet[1950]: E0510 00:45:18.793752 1950 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:45:18.794004 kubelet[1950]: I0510 00:45:18.793971 1950 factory.go:221] Registration of the systemd container factory successfully May 10 00:45:18.794208 kubelet[1950]: I0510 00:45:18.794179 1950 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:45:18.797075 kubelet[1950]: I0510 00:45:18.797050 1950 factory.go:221] Registration of the containerd container factory successfully May 10 00:45:18.799829 kubelet[1950]: I0510 00:45:18.799784 1950 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:45:18.800672 kubelet[1950]: I0510 00:45:18.800658 1950 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:45:18.800813 kubelet[1950]: I0510 00:45:18.800763 1950 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:45:18.800880 kubelet[1950]: I0510 00:45:18.800863 1950 kubelet.go:2321] "Starting kubelet main sync loop" May 10 00:45:18.800982 kubelet[1950]: E0510 00:45:18.800946 1950 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:45:18.837091 kubelet[1950]: I0510 00:45:18.837054 1950 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:45:18.837091 kubelet[1950]: I0510 00:45:18.837083 1950 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:45:18.837091 kubelet[1950]: I0510 00:45:18.837101 1950 state_mem.go:36] "Initialized new in-memory state store" May 10 00:45:18.837287 kubelet[1950]: I0510 00:45:18.837238 1950 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:45:18.837287 kubelet[1950]: I0510 00:45:18.837247 1950 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:45:18.837287 kubelet[1950]: I0510 00:45:18.837262 1950 policy_none.go:49] "None policy: Start" May 10 00:45:18.837765 kubelet[1950]: I0510 00:45:18.837753 1950 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:45:18.837819 kubelet[1950]: I0510 00:45:18.837769 1950 state_mem.go:35] "Initializing new in-memory state store" May 10 00:45:18.837978 kubelet[1950]: I0510 00:45:18.837964 1950 state_mem.go:75] "Updated machine memory state" May 10 00:45:18.841405 kubelet[1950]: I0510 00:45:18.841385 1950 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:45:18.840000 audit[1950]: AVC avc: denied { mac_admin } for pid=1950 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:18.840000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:45:18.840000 audit[1950]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00051d020 a1=c0011b5278 a2=c00051cfc0 a3=25 items=0 ppid=1 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:18.840000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:45:18.841624 kubelet[1950]: I0510 00:45:18.841437 1950 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:45:18.841624 kubelet[1950]: I0510 00:45:18.841555 1950 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:45:18.841624 kubelet[1950]: I0510 00:45:18.841567 1950 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:45:18.841847 kubelet[1950]: I0510 00:45:18.841803 1950 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:45:18.946218 kubelet[1950]: I0510 00:45:18.946169 1950 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 00:45:18.994456 kubelet[1950]: I0510 00:45:18.994407 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/95cba58f4d04e6e9265a027b53c1c61e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"95cba58f4d04e6e9265a027b53c1c61e\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:18.994456 kubelet[1950]: I0510 00:45:18.994458 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:18.994673 kubelet[1950]: I0510 00:45:18.994490 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:18.994673 kubelet[1950]: I0510 00:45:18.994546 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:18.994673 kubelet[1950]: I0510 00:45:18.994564 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:18.994673 kubelet[1950]: I0510 00:45:18.994580 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 10 00:45:18.994673 kubelet[1950]: I0510 00:45:18.994597 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/95cba58f4d04e6e9265a027b53c1c61e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"95cba58f4d04e6e9265a027b53c1c61e\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:18.994992 kubelet[1950]: I0510 00:45:18.994668 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/95cba58f4d04e6e9265a027b53c1c61e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"95cba58f4d04e6e9265a027b53c1c61e\") " pod="kube-system/kube-apiserver-localhost" May 10 00:45:18.994992 kubelet[1950]: I0510 00:45:18.994693 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:45:19.276025 kubelet[1950]: E0510 00:45:19.275894 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:19.276305 kubelet[1950]: E0510 00:45:19.275972 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:19.276368 kubelet[1950]: E0510 00:45:19.276062 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:19.284450 kubelet[1950]: I0510 00:45:19.284408 1950 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 10 00:45:19.284583 kubelet[1950]: I0510 00:45:19.284520 1950 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 10 00:45:19.775244 kubelet[1950]: I0510 00:45:19.775197 1950 apiserver.go:52] "Watching apiserver" May 10 00:45:19.793870 kubelet[1950]: I0510 00:45:19.793822 1950 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 00:45:19.814125 kubelet[1950]: E0510 00:45:19.814077 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:19.814125 kubelet[1950]: E0510 00:45:19.814124 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:19.851753 kubelet[1950]: I0510 00:45:19.851674 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.851649166 podStartE2EDuration="851.649166ms" podCreationTimestamp="2025-05-10 00:45:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:19.851320308 +0000 UTC m=+1.175490886" watchObservedRunningTime="2025-05-10 00:45:19.851649166 +0000 UTC m=+1.175819744" May 10 00:45:19.853682 kubelet[1950]: E0510 00:45:19.853631 1950 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 10 00:45:19.853924 kubelet[1950]: E0510 00:45:19.853892 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:20.053809 update_engine[1203]: I0510 00:45:20.053658 1203 update_attempter.cc:509] Updating boot flags... May 10 00:45:20.085120 kubelet[1950]: I0510 00:45:20.085034 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.085001739 podStartE2EDuration="1.085001739s" podCreationTimestamp="2025-05-10 00:45:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:20.08451215 +0000 UTC m=+1.408682738" watchObservedRunningTime="2025-05-10 00:45:20.085001739 +0000 UTC m=+1.409172317" May 10 00:45:20.512135 kubelet[1950]: I0510 00:45:20.510399 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.510351923 podStartE2EDuration="1.510351923s" podCreationTimestamp="2025-05-10 00:45:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:20.318513922 +0000 UTC m=+1.642684520" watchObservedRunningTime="2025-05-10 00:45:20.510351923 +0000 UTC m=+1.834522501" May 10 00:45:20.817170 kubelet[1950]: E0510 00:45:20.817021 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:21.887913 kubelet[1950]: E0510 00:45:21.887870 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:22.820569 kubelet[1950]: E0510 00:45:22.820533 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:23.217529 kubelet[1950]: I0510 00:45:23.217393 1950 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:45:23.217971 env[1212]: time="2025-05-10T00:45:23.217797354Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:45:23.218222 kubelet[1950]: I0510 00:45:23.218113 1950 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:45:24.366841 systemd[1]: Created slice kubepods-besteffort-pod218359bc_ea17_4ddc_a643_dcb78b88bd9a.slice. May 10 00:45:24.539273 kubelet[1950]: I0510 00:45:24.539221 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/218359bc-ea17-4ddc-a643-dcb78b88bd9a-kube-proxy\") pod \"kube-proxy-gdgkd\" (UID: \"218359bc-ea17-4ddc-a643-dcb78b88bd9a\") " pod="kube-system/kube-proxy-gdgkd" May 10 00:45:24.539273 kubelet[1950]: I0510 00:45:24.539263 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/218359bc-ea17-4ddc-a643-dcb78b88bd9a-lib-modules\") pod \"kube-proxy-gdgkd\" (UID: \"218359bc-ea17-4ddc-a643-dcb78b88bd9a\") " pod="kube-system/kube-proxy-gdgkd" May 10 00:45:24.539273 kubelet[1950]: I0510 00:45:24.539280 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/218359bc-ea17-4ddc-a643-dcb78b88bd9a-xtables-lock\") pod \"kube-proxy-gdgkd\" (UID: \"218359bc-ea17-4ddc-a643-dcb78b88bd9a\") " pod="kube-system/kube-proxy-gdgkd" May 10 00:45:24.539273 kubelet[1950]: I0510 00:45:24.539295 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gnd7n\" (UniqueName: \"kubernetes.io/projected/218359bc-ea17-4ddc-a643-dcb78b88bd9a-kube-api-access-gnd7n\") pod \"kube-proxy-gdgkd\" (UID: \"218359bc-ea17-4ddc-a643-dcb78b88bd9a\") " pod="kube-system/kube-proxy-gdgkd" May 10 00:45:24.655158 kubelet[1950]: I0510 00:45:24.654952 1950 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:45:24.677368 kubelet[1950]: E0510 00:45:24.677323 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:24.678375 env[1212]: time="2025-05-10T00:45:24.678296777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gdgkd,Uid:218359bc-ea17-4ddc-a643-dcb78b88bd9a,Namespace:kube-system,Attempt:0,}" May 10 00:45:25.084918 env[1212]: time="2025-05-10T00:45:25.084806643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:25.085096 env[1212]: time="2025-05-10T00:45:25.084924776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:25.085096 env[1212]: time="2025-05-10T00:45:25.084941405Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:25.085358 env[1212]: time="2025-05-10T00:45:25.085267026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93263c53a401fb21e8e95cce385ab8e7b1beaa81fdedc33a82049cb0406241d1 pid=2014 runtime=io.containerd.runc.v2 May 10 00:45:25.099429 systemd[1]: Started cri-containerd-93263c53a401fb21e8e95cce385ab8e7b1beaa81fdedc33a82049cb0406241d1.scope. May 10 00:45:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.108085 kernel: kauditd_printk_skb: 263 callbacks suppressed May 10 00:45:25.108147 kernel: audit: type=1400 audit(1746837925.106:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.114885 kernel: audit: type=1400 audit(1746837925.106:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.114974 kernel: audit: type=1400 audit(1746837925.106:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.121244 kernel: audit: type=1400 audit(1746837925.106:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.121307 kernel: audit: type=1400 audit(1746837925.106:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.126233 kernel: audit: type=1400 audit(1746837925.106:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.134415 kernel: audit: type=1400 audit(1746837925.106:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.137967 kernel: audit: type=1400 audit(1746837925.106:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.138020 kernel: audit: type=1400 audit(1746837925.106:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.145053 kernel: audit: type=1400 audit(1746837925.110:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.110000 audit: BPF prog-id=100 op=LOAD May 10 00:45:25.113000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2014 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323633633533613430316662323165386539356363653338356162 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2014 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323633633533613430316662323165386539356363653338356162 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.113000 audit: BPF prog-id=101 op=LOAD May 10 00:45:25.113000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018dfa0 items=0 ppid=2014 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323633633533613430316662323165386539356363653338356162 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.117000 audit: BPF prog-id=102 op=LOAD May 10 00:45:25.117000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018dfe8 items=0 ppid=2014 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323633633533613430316662323165386539356363653338356162 May 10 00:45:25.124000 audit: BPF prog-id=102 op=UNLOAD May 10 00:45:25.124000 audit: BPF prog-id=101 op=UNLOAD May 10 00:45:25.124000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.124000 audit: BPF prog-id=103 op=LOAD May 10 00:45:25.124000 audit[2025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c63f8 items=0 ppid=2014 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323633633533613430316662323165386539356363653338356162 May 10 00:45:25.156334 env[1212]: time="2025-05-10T00:45:25.156300808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gdgkd,Uid:218359bc-ea17-4ddc-a643-dcb78b88bd9a,Namespace:kube-system,Attempt:0,} returns sandbox id \"93263c53a401fb21e8e95cce385ab8e7b1beaa81fdedc33a82049cb0406241d1\"" May 10 00:45:25.157627 kubelet[1950]: E0510 00:45:25.157598 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:25.160078 env[1212]: time="2025-05-10T00:45:25.160036978Z" level=info msg="CreateContainer within sandbox \"93263c53a401fb21e8e95cce385ab8e7b1beaa81fdedc33a82049cb0406241d1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:45:25.235922 env[1212]: time="2025-05-10T00:45:25.235851992Z" level=info msg="CreateContainer within sandbox \"93263c53a401fb21e8e95cce385ab8e7b1beaa81fdedc33a82049cb0406241d1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e016c15beb4bc345ee16f7138c8b9e4b61a39d31e1da9c5a6a78529ec19b7de7\"" May 10 00:45:25.236926 env[1212]: time="2025-05-10T00:45:25.236862747Z" level=info msg="StartContainer for \"e016c15beb4bc345ee16f7138c8b9e4b61a39d31e1da9c5a6a78529ec19b7de7\"" May 10 00:45:25.274551 systemd[1]: Started cri-containerd-e016c15beb4bc345ee16f7138c8b9e4b61a39d31e1da9c5a6a78529ec19b7de7.scope. May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f743e772378 items=0 ppid=2014 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663313562656234626333343565653136663731333863386239 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit: BPF prog-id=104 op=LOAD May 10 00:45:25.295000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e7c58 items=0 ppid=2014 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663313562656234626333343565653136663731333863386239 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.295000 audit: BPF prog-id=105 op=LOAD May 10 00:45:25.295000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e7ca8 items=0 ppid=2014 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663313562656234626333343565653136663731333863386239 May 10 00:45:25.296000 audit: BPF prog-id=105 op=UNLOAD May 10 00:45:25.296000 audit: BPF prog-id=104 op=UNLOAD May 10 00:45:25.296000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.296000 audit: BPF prog-id=106 op=LOAD May 10 00:45:25.296000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e7d38 items=0 ppid=2014 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663313562656234626333343565653136663731333863386239 May 10 00:45:25.321981 env[1212]: time="2025-05-10T00:45:25.321918636Z" level=info msg="StartContainer for \"e016c15beb4bc345ee16f7138c8b9e4b61a39d31e1da9c5a6a78529ec19b7de7\" returns successfully" May 10 00:45:25.462000 audit[2117]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.462000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6278ddb0 a2=0 a3=7fff6278dd9c items=0 ppid=2065 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:45:25.464000 audit[2119]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.464000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3a073e50 a2=0 a3=7ffd3a073e3c items=0 ppid=2065 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:45:25.465000 audit[2120]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.465000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe372e7680 a2=0 a3=7ffe372e766c items=0 ppid=2065 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:45:25.467000 audit[2118]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.467000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1fc28be0 a2=0 a3=7ffe1fc28bcc items=0 ppid=2065 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:45:25.472000 audit[2121]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.472000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec7916e80 a2=0 a3=7ffec7916e6c items=0 ppid=2065 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:45:25.473000 audit[2122]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.473000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc12d2fef0 a2=0 a3=7ffc12d2fedc items=0 ppid=2065 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:45:25.570000 audit[2123]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.570000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe8b2e1ba0 a2=0 a3=7ffe8b2e1b8c items=0 ppid=2065 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:45:25.581000 audit[2125]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.581000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc31223d30 a2=0 a3=7ffc31223d1c items=0 ppid=2065 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:45:25.586000 audit[2128]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.586000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc7538a6f0 a2=0 a3=7ffc7538a6dc items=0 ppid=2065 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:45:25.589000 audit[2129]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.589000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfa306c50 a2=0 a3=7ffcfa306c3c items=0 ppid=2065 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:45:25.592000 audit[2131]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.592000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd80ec52f0 a2=0 a3=7ffd80ec52dc items=0 ppid=2065 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:45:25.594000 audit[2132]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.594000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe89f9a790 a2=0 a3=7ffe89f9a77c items=0 ppid=2065 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:45:25.596000 audit[2134]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.596000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff15078060 a2=0 a3=7fff1507804c items=0 ppid=2065 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:45:25.600000 audit[2137]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.600000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff311203c0 a2=0 a3=7fff311203ac items=0 ppid=2065 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:45:25.602000 audit[2138]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.602000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe60c58b20 a2=0 a3=7ffe60c58b0c items=0 ppid=2065 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:45:25.606000 audit[2140]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.606000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff35877b70 a2=0 a3=7fff35877b5c items=0 ppid=2065 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:45:25.607000 audit[2141]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.607000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffeb917f20 a2=0 a3=7fffeb917f0c items=0 ppid=2065 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:45:25.610000 audit[2143]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.610000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7900e820 a2=0 a3=7ffd7900e80c items=0 ppid=2065 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:45:25.613000 audit[2146]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.613000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc904ee80 a2=0 a3=7ffcc904ee6c items=0 ppid=2065 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:45:25.617000 audit[2149]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.617000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc906b5b70 a2=0 a3=7ffc906b5b5c items=0 ppid=2065 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:45:25.619000 audit[2150]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.619000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4d0f9190 a2=0 a3=7ffd4d0f917c items=0 ppid=2065 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:45:25.622000 audit[2152]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.622000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff9ba91290 a2=0 a3=7fff9ba9127c items=0 ppid=2065 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:25.626000 audit[2155]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.626000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe83a6a360 a2=0 a3=7ffe83a6a34c items=0 ppid=2065 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:25.627000 audit[2156]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.627000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6a1b81c0 a2=0 a3=7ffd6a1b81ac items=0 ppid=2065 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:45:25.629000 audit[2158]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:25.629000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff56c46f40 a2=0 a3=7fff56c46f2c items=0 ppid=2065 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:45:25.688000 audit[2164]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:25.688000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd9ecb9410 a2=0 a3=7ffd9ecb93fc items=0 ppid=2065 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:25.710000 audit[2164]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:25.710000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd9ecb9410 a2=0 a3=7ffd9ecb93fc items=0 ppid=2065 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:25.723000 audit[2169]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.723000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe72b73d10 a2=0 a3=7ffe72b73cfc items=0 ppid=2065 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:45:25.742000 audit[2171]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.742000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcce633250 a2=0 a3=7ffcce63323c items=0 ppid=2065 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:45:25.748000 audit[2174]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.748000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3e32de70 a2=0 a3=7ffd3e32de5c items=0 ppid=2065 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:45:25.752000 audit[2175]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.752000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdefbaf3a0 a2=0 a3=7ffdefbaf38c items=0 ppid=2065 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:45:25.755000 audit[2177]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.755000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfed521d0 a2=0 a3=7ffdfed521bc items=0 ppid=2065 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:45:25.756000 audit[2178]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.756000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9113a360 a2=0 a3=7ffd9113a34c items=0 ppid=2065 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:45:25.759000 audit[2180]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.759000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc2628e60 a2=0 a3=7ffdc2628e4c items=0 ppid=2065 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:45:25.768000 audit[2183]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.768000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc7c64aa90 a2=0 a3=7ffc7c64aa7c items=0 ppid=2065 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:45:25.770000 audit[2184]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.770000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff16009330 a2=0 a3=7fff1600931c items=0 ppid=2065 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:45:25.772000 audit[2186]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.772000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6526b270 a2=0 a3=7ffc6526b25c items=0 ppid=2065 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:45:25.773000 audit[2187]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.773000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe05646800 a2=0 a3=7ffe056467ec items=0 ppid=2065 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:45:25.776000 audit[2189]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.776000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcbd6c060 a2=0 a3=7ffdcbd6c04c items=0 ppid=2065 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:45:25.781000 audit[2192]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.781000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe356a33f0 a2=0 a3=7ffe356a33dc items=0 ppid=2065 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:45:25.785000 audit[2195]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.785000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe80ed6210 a2=0 a3=7ffe80ed61fc items=0 ppid=2065 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:45:25.786000 audit[2196]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.786000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3cd4ca90 a2=0 a3=7fff3cd4ca7c items=0 ppid=2065 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:45:25.789000 audit[2198]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.789000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd828b530 a2=0 a3=7ffdd828b51c items=0 ppid=2065 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:25.792000 audit[2201]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.792000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdd9d485d0 a2=0 a3=7ffdd9d485bc items=0 ppid=2065 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:25.794000 audit[2202]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.794000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0083fcd0 a2=0 a3=7ffd0083fcbc items=0 ppid=2065 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:45:25.797000 audit[2204]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.797000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcd7e4d060 a2=0 a3=7ffcd7e4d04c items=0 ppid=2065 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:45:25.798000 audit[2205]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.798000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5828e520 a2=0 a3=7ffe5828e50c items=0 ppid=2065 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:45:25.801000 audit[2207]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.801000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcffe2fe10 a2=0 a3=7ffcffe2fdfc items=0 ppid=2065 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:25.805000 audit[2210]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:25.805000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce7c0eee0 a2=0 a3=7ffce7c0eecc items=0 ppid=2065 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:25.809000 audit[2212]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:45:25.809000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe4868cd30 a2=0 a3=7ffe4868cd1c items=0 ppid=2065 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.809000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:25.810000 audit[2212]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:45:25.810000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe4868cd30 a2=0 a3=7ffe4868cd1c items=0 ppid=2065 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.810000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:25.827656 kubelet[1950]: E0510 00:45:25.827602 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:26.204953 kubelet[1950]: I0510 00:45:26.204868 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-gdgkd" podStartSLOduration=3.204840413 podStartE2EDuration="3.204840413s" podCreationTimestamp="2025-05-10 00:45:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:25.839985505 +0000 UTC m=+7.164156113" watchObservedRunningTime="2025-05-10 00:45:26.204840413 +0000 UTC m=+7.529010991" May 10 00:45:26.211041 systemd[1]: Created slice kubepods-besteffort-pod3b95e41b_53ac_4dc1_a24c_2e26eb710109.slice. May 10 00:45:26.352325 kubelet[1950]: I0510 00:45:26.352255 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3b95e41b-53ac-4dc1-a24c-2e26eb710109-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-44jx9\" (UID: \"3b95e41b-53ac-4dc1-a24c-2e26eb710109\") " pod="tigera-operator/tigera-operator-6f6897fdc5-44jx9" May 10 00:45:26.352325 kubelet[1950]: I0510 00:45:26.352336 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b7pqb\" (UniqueName: \"kubernetes.io/projected/3b95e41b-53ac-4dc1-a24c-2e26eb710109-kube-api-access-b7pqb\") pod \"tigera-operator-6f6897fdc5-44jx9\" (UID: \"3b95e41b-53ac-4dc1-a24c-2e26eb710109\") " pod="tigera-operator/tigera-operator-6f6897fdc5-44jx9" May 10 00:45:26.517022 env[1212]: time="2025-05-10T00:45:26.516356193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-44jx9,Uid:3b95e41b-53ac-4dc1-a24c-2e26eb710109,Namespace:tigera-operator,Attempt:0,}" May 10 00:45:26.556194 env[1212]: time="2025-05-10T00:45:26.556068986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:26.556388 env[1212]: time="2025-05-10T00:45:26.556210740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:26.556388 env[1212]: time="2025-05-10T00:45:26.556244608Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:26.556681 env[1212]: time="2025-05-10T00:45:26.556608722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dabccb3a736d88dc0a7ca35ba87effa3deb0226ed53423da723cfbbae2a0f0c6 pid=2240 runtime=io.containerd.runc.v2 May 10 00:45:26.573865 systemd[1]: Started cri-containerd-dabccb3a736d88dc0a7ca35ba87effa3deb0226ed53423da723cfbbae2a0f0c6.scope. May 10 00:45:26.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.597000 audit: BPF prog-id=107 op=LOAD May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2240 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363623361373336643838646330613763613335626138376566 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2240 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363623361373336643838646330613763613335626138376566 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit: BPF prog-id=108 op=LOAD May 10 00:45:26.598000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003295b0 items=0 ppid=2240 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363623361373336643838646330613763613335626138376566 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit: BPF prog-id=109 op=LOAD May 10 00:45:26.598000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003295f8 items=0 ppid=2240 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363623361373336643838646330613763613335626138376566 May 10 00:45:26.598000 audit: BPF prog-id=109 op=UNLOAD May 10 00:45:26.598000 audit: BPF prog-id=108 op=UNLOAD May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.598000 audit: BPF prog-id=110 op=LOAD May 10 00:45:26.598000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000329a08 items=0 ppid=2240 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363623361373336643838646330613763613335626138376566 May 10 00:45:26.626396 env[1212]: time="2025-05-10T00:45:26.626340243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-44jx9,Uid:3b95e41b-53ac-4dc1-a24c-2e26eb710109,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"dabccb3a736d88dc0a7ca35ba87effa3deb0226ed53423da723cfbbae2a0f0c6\"" May 10 00:45:26.628571 env[1212]: time="2025-05-10T00:45:26.628524797Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:45:26.660232 systemd[1]: run-containerd-runc-k8s.io-dabccb3a736d88dc0a7ca35ba87effa3deb0226ed53423da723cfbbae2a0f0c6-runc.uOqStl.mount: Deactivated successfully. May 10 00:45:26.662756 kubelet[1950]: E0510 00:45:26.662333 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:26.830751 kubelet[1950]: E0510 00:45:26.830590 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:28.310773 kubelet[1950]: E0510 00:45:28.310686 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:28.833108 kubelet[1950]: E0510 00:45:28.833067 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:29.316601 sudo[1342]: pam_unix(sudo:session): session closed for user root May 10 00:45:29.315000 audit[1342]: USER_END pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:29.316000 audit[1342]: CRED_DISP pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:29.321982 sshd[1339]: pam_unix(sshd:session): session closed for user core May 10 00:45:29.322000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:29.322000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:45:29.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.116:22-10.0.0.1:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:29.324895 systemd[1]: sshd@6-10.0.0.116:22-10.0.0.1:32770.service: Deactivated successfully. May 10 00:45:29.325874 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:45:29.326059 systemd[1]: session-7.scope: Consumed 4.988s CPU time. May 10 00:45:29.326745 systemd-logind[1200]: Session 7 logged out. Waiting for processes to exit. May 10 00:45:29.329148 systemd-logind[1200]: Removed session 7. May 10 00:45:31.040675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3650798954.mount: Deactivated successfully. May 10 00:45:32.265359 env[1212]: time="2025-05-10T00:45:32.265285583Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.269483 env[1212]: time="2025-05-10T00:45:32.269414795Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.271947 env[1212]: time="2025-05-10T00:45:32.271887288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.275844 env[1212]: time="2025-05-10T00:45:32.275792177Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.276454 env[1212]: time="2025-05-10T00:45:32.276393980Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:45:32.279846 env[1212]: time="2025-05-10T00:45:32.279809104Z" level=info msg="CreateContainer within sandbox \"dabccb3a736d88dc0a7ca35ba87effa3deb0226ed53423da723cfbbae2a0f0c6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:45:32.317141 env[1212]: time="2025-05-10T00:45:32.317052001Z" level=info msg="CreateContainer within sandbox \"dabccb3a736d88dc0a7ca35ba87effa3deb0226ed53423da723cfbbae2a0f0c6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"bddb413b1c6b8a2364dfe131d99820ab82e3b48dd5cb02d10eefcdc5a6cf66b3\"" May 10 00:45:32.317935 env[1212]: time="2025-05-10T00:45:32.317891546Z" level=info msg="StartContainer for \"bddb413b1c6b8a2364dfe131d99820ab82e3b48dd5cb02d10eefcdc5a6cf66b3\"" May 10 00:45:32.339540 systemd[1]: Started cri-containerd-bddb413b1c6b8a2364dfe131d99820ab82e3b48dd5cb02d10eefcdc5a6cf66b3.scope. May 10 00:45:32.357417 kernel: kauditd_printk_skb: 305 callbacks suppressed May 10 00:45:32.357617 kernel: audit: type=1400 audit(1746837932.351:892): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.357652 kernel: audit: type=1400 audit(1746837932.351:893): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361061 kernel: audit: type=1400 audit(1746837932.351:894): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.368384 kernel: audit: type=1400 audit(1746837932.351:895): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.368455 kernel: audit: type=1400 audit(1746837932.351:896): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.372452 kernel: audit: type=1400 audit(1746837932.351:897): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.376307 kernel: audit: type=1400 audit(1746837932.351:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.380815 kernel: audit: type=1400 audit(1746837932.351:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.384579 kernel: audit: type=1400 audit(1746837932.351:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.392561 kernel: audit: type=1400 audit(1746837932.359:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.359000 audit: BPF prog-id=111 op=LOAD May 10 00:45:32.361000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2240 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264646234313362316336623861323336346466653133316439393832 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2240 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264646234313362316336623861323336346466653133316439393832 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.361000 audit: BPF prog-id=112 op=LOAD May 10 00:45:32.361000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324c70 items=0 ppid=2240 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264646234313362316336623861323336346466653133316439393832 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.363000 audit: BPF prog-id=113 op=LOAD May 10 00:45:32.363000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000324cb8 items=0 ppid=2240 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264646234313362316336623861323336346466653133316439393832 May 10 00:45:32.371000 audit: BPF prog-id=113 op=UNLOAD May 10 00:45:32.371000 audit: BPF prog-id=112 op=UNLOAD May 10 00:45:32.371000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.371000 audit: BPF prog-id=114 op=LOAD May 10 00:45:32.371000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003250c8 items=0 ppid=2240 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264646234313362316336623861323336346466653133316439393832 May 10 00:45:32.412220 env[1212]: time="2025-05-10T00:45:32.412096720Z" level=info msg="StartContainer for \"bddb413b1c6b8a2364dfe131d99820ab82e3b48dd5cb02d10eefcdc5a6cf66b3\" returns successfully" May 10 00:45:32.859742 kubelet[1950]: I0510 00:45:32.859647 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-44jx9" podStartSLOduration=1.210063472 podStartE2EDuration="6.859611968s" podCreationTimestamp="2025-05-10 00:45:26 +0000 UTC" firstStartedPulling="2025-05-10 00:45:26.627853248 +0000 UTC m=+7.952023827" lastFinishedPulling="2025-05-10 00:45:32.277401745 +0000 UTC m=+13.601572323" observedRunningTime="2025-05-10 00:45:32.858768434 +0000 UTC m=+14.182939022" watchObservedRunningTime="2025-05-10 00:45:32.859611968 +0000 UTC m=+14.183782546" May 10 00:45:35.175000 audit[2343]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:35.175000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd13c12a30 a2=0 a3=7ffd13c12a1c items=0 ppid=2065 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:35.180000 audit[2343]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:35.180000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd13c12a30 a2=0 a3=0 items=0 ppid=2065 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:35.190000 audit[2345]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:35.190000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd3869a930 a2=0 a3=7ffd3869a91c items=0 ppid=2065 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:35.204000 audit[2345]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:35.204000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd3869a930 a2=0 a3=0 items=0 ppid=2065 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.095183 systemd[1]: Created slice kubepods-besteffort-podb9d2efb5_3e2b_44d7_9435_08bde2e7efc5.slice. May 10 00:45:37.160000 audit[2348]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.160000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc642edfa0 a2=0 a3=7ffc642edf8c items=0 ppid=2065 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.164000 audit[2348]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.164000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc642edfa0 a2=0 a3=0 items=0 ppid=2065 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.224891 kubelet[1950]: I0510 00:45:37.224772 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9d2efb5-3e2b-44d7-9435-08bde2e7efc5-tigera-ca-bundle\") pod \"calico-typha-5d6dbb95df-xqd5n\" (UID: \"b9d2efb5-3e2b-44d7-9435-08bde2e7efc5\") " pod="calico-system/calico-typha-5d6dbb95df-xqd5n" May 10 00:45:37.225375 kubelet[1950]: I0510 00:45:37.224929 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b9d2efb5-3e2b-44d7-9435-08bde2e7efc5-typha-certs\") pod \"calico-typha-5d6dbb95df-xqd5n\" (UID: \"b9d2efb5-3e2b-44d7-9435-08bde2e7efc5\") " pod="calico-system/calico-typha-5d6dbb95df-xqd5n" May 10 00:45:37.225375 kubelet[1950]: I0510 00:45:37.224978 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vhzgn\" (UniqueName: \"kubernetes.io/projected/b9d2efb5-3e2b-44d7-9435-08bde2e7efc5-kube-api-access-vhzgn\") pod \"calico-typha-5d6dbb95df-xqd5n\" (UID: \"b9d2efb5-3e2b-44d7-9435-08bde2e7efc5\") " pod="calico-system/calico-typha-5d6dbb95df-xqd5n" May 10 00:45:37.404756 kernel: kauditd_printk_skb: 65 callbacks suppressed May 10 00:45:37.404941 kernel: audit: type=1325 audit(1746837937.401:916): table=filter:95 family=2 entries=18 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.401000 audit[2351]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.401000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffedc31fff0 a2=0 a3=7ffedc31ffdc items=0 ppid=2065 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.411893 kernel: audit: type=1300 audit(1746837937.401:916): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffedc31fff0 a2=0 a3=7ffedc31ffdc items=0 ppid=2065 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.412037 kernel: audit: type=1327 audit(1746837937.401:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.415000 audit[2351]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.415000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffedc31fff0 a2=0 a3=0 items=0 ppid=2065 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.424310 kernel: audit: type=1325 audit(1746837937.415:917): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.424373 kernel: audit: type=1300 audit(1746837937.415:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffedc31fff0 a2=0 a3=0 items=0 ppid=2065 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.424405 kernel: audit: type=1327 audit(1746837937.415:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.998877 kubelet[1950]: E0510 00:45:37.998817 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:37.999459 env[1212]: time="2025-05-10T00:45:37.999404440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5d6dbb95df-xqd5n,Uid:b9d2efb5-3e2b-44d7-9435-08bde2e7efc5,Namespace:calico-system,Attempt:0,}" May 10 00:45:38.306871 env[1212]: time="2025-05-10T00:45:38.306706267Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:38.306871 env[1212]: time="2025-05-10T00:45:38.306776678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:38.306871 env[1212]: time="2025-05-10T00:45:38.306788583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:38.307045 env[1212]: time="2025-05-10T00:45:38.306953705Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/230bc5e20d864848f3edae0284a40a37cfaacf65008f5ca6a2771abd7d69222a pid=2361 runtime=io.containerd.runc.v2 May 10 00:45:38.320288 systemd[1]: Started cri-containerd-230bc5e20d864848f3edae0284a40a37cfaacf65008f5ca6a2771abd7d69222a.scope. May 10 00:45:38.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.337200 kernel: audit: type=1400 audit(1746837938.328:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.337332 kernel: audit: type=1400 audit(1746837938.328:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.341063 kernel: audit: type=1400 audit(1746837938.328:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.344893 kernel: audit: type=1400 audit(1746837938.328:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit: BPF prog-id=115 op=LOAD May 10 00:45:38.332000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2361 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233306263356532306438363438343866336564616530323834613430 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2361 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233306263356532306438363438343866336564616530323834613430 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.332000 audit: BPF prog-id=116 op=LOAD May 10 00:45:38.332000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a800 items=0 ppid=2361 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233306263356532306438363438343866336564616530323834613430 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit: BPF prog-id=117 op=LOAD May 10 00:45:38.336000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028a848 items=0 ppid=2361 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233306263356532306438363438343866336564616530323834613430 May 10 00:45:38.336000 audit: BPF prog-id=117 op=UNLOAD May 10 00:45:38.336000 audit: BPF prog-id=116 op=UNLOAD May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.336000 audit: BPF prog-id=118 op=LOAD May 10 00:45:38.336000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028ac58 items=0 ppid=2361 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233306263356532306438363438343866336564616530323834613430 May 10 00:45:38.360819 systemd[1]: Created slice kubepods-besteffort-pod730e1b36_845f_4d8c_af66_aa7f296e42e5.slice. May 10 00:45:38.392641 env[1212]: time="2025-05-10T00:45:38.392586856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5d6dbb95df-xqd5n,Uid:b9d2efb5-3e2b-44d7-9435-08bde2e7efc5,Namespace:calico-system,Attempt:0,} returns sandbox id \"230bc5e20d864848f3edae0284a40a37cfaacf65008f5ca6a2771abd7d69222a\"" May 10 00:45:38.393702 kubelet[1950]: E0510 00:45:38.393647 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:38.395513 kubelet[1950]: E0510 00:45:38.395478 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:38.395799 env[1212]: time="2025-05-10T00:45:38.395665124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:45:38.432733 kubelet[1950]: I0510 00:45:38.432653 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/88369301-e94b-4f26-89a8-6639d6b6ee8d-socket-dir\") pod \"csi-node-driver-gb6dh\" (UID: \"88369301-e94b-4f26-89a8-6639d6b6ee8d\") " pod="calico-system/csi-node-driver-gb6dh" May 10 00:45:38.432733 kubelet[1950]: I0510 00:45:38.432729 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-cni-log-dir\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.432953 kubelet[1950]: I0510 00:45:38.432752 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/88369301-e94b-4f26-89a8-6639d6b6ee8d-kubelet-dir\") pod \"csi-node-driver-gb6dh\" (UID: \"88369301-e94b-4f26-89a8-6639d6b6ee8d\") " pod="calico-system/csi-node-driver-gb6dh" May 10 00:45:38.432953 kubelet[1950]: I0510 00:45:38.432773 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-cni-bin-dir\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.432953 kubelet[1950]: I0510 00:45:38.432796 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/88369301-e94b-4f26-89a8-6639d6b6ee8d-registration-dir\") pod \"csi-node-driver-gb6dh\" (UID: \"88369301-e94b-4f26-89a8-6639d6b6ee8d\") " pod="calico-system/csi-node-driver-gb6dh" May 10 00:45:38.432953 kubelet[1950]: I0510 00:45:38.432820 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/730e1b36-845f-4d8c-af66-aa7f296e42e5-node-certs\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.432953 kubelet[1950]: I0510 00:45:38.432837 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/730e1b36-845f-4d8c-af66-aa7f296e42e5-tigera-ca-bundle\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433191 kubelet[1950]: I0510 00:45:38.432853 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-var-run-calico\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433191 kubelet[1950]: I0510 00:45:38.432869 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rh5ck\" (UniqueName: \"kubernetes.io/projected/730e1b36-845f-4d8c-af66-aa7f296e42e5-kube-api-access-rh5ck\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433191 kubelet[1950]: I0510 00:45:38.432898 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-lib-modules\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433191 kubelet[1950]: I0510 00:45:38.432916 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-xtables-lock\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433191 kubelet[1950]: I0510 00:45:38.432932 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/88369301-e94b-4f26-89a8-6639d6b6ee8d-varrun\") pod \"csi-node-driver-gb6dh\" (UID: \"88369301-e94b-4f26-89a8-6639d6b6ee8d\") " pod="calico-system/csi-node-driver-gb6dh" May 10 00:45:38.433351 kubelet[1950]: I0510 00:45:38.432950 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-var-lib-calico\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433351 kubelet[1950]: I0510 00:45:38.432968 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-cni-net-dir\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433351 kubelet[1950]: I0510 00:45:38.432986 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-flexvol-driver-host\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.433351 kubelet[1950]: I0510 00:45:38.433028 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sd8hp\" (UniqueName: \"kubernetes.io/projected/88369301-e94b-4f26-89a8-6639d6b6ee8d-kube-api-access-sd8hp\") pod \"csi-node-driver-gb6dh\" (UID: \"88369301-e94b-4f26-89a8-6639d6b6ee8d\") " pod="calico-system/csi-node-driver-gb6dh" May 10 00:45:38.433351 kubelet[1950]: I0510 00:45:38.433055 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/730e1b36-845f-4d8c-af66-aa7f296e42e5-policysync\") pod \"calico-node-s57qj\" (UID: \"730e1b36-845f-4d8c-af66-aa7f296e42e5\") " pod="calico-system/calico-node-s57qj" May 10 00:45:38.436000 audit[2394]: NETFILTER_CFG table=filter:97 family=2 entries=18 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:38.436000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffebb461d40 a2=0 a3=7ffebb461d2c items=0 ppid=2065 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:38.441000 audit[2394]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:38.441000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffebb461d40 a2=0 a3=0 items=0 ppid=2065 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:38.541898 kubelet[1950]: E0510 00:45:38.541854 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:38.541898 kubelet[1950]: W0510 00:45:38.541887 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:38.542068 kubelet[1950]: E0510 00:45:38.541924 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:38.551776 kubelet[1950]: E0510 00:45:38.545254 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:38.551776 kubelet[1950]: W0510 00:45:38.545273 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:38.551776 kubelet[1950]: E0510 00:45:38.545294 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:38.553417 kubelet[1950]: E0510 00:45:38.553367 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:38.553417 kubelet[1950]: W0510 00:45:38.553395 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:38.553417 kubelet[1950]: E0510 00:45:38.553424 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:38.666674 kubelet[1950]: E0510 00:45:38.666525 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:38.667276 env[1212]: time="2025-05-10T00:45:38.667194260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s57qj,Uid:730e1b36-845f-4d8c-af66-aa7f296e42e5,Namespace:calico-system,Attempt:0,}" May 10 00:45:38.691782 env[1212]: time="2025-05-10T00:45:38.691674265Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:38.691974 env[1212]: time="2025-05-10T00:45:38.691795755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:38.691974 env[1212]: time="2025-05-10T00:45:38.691828665Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:38.692504 env[1212]: time="2025-05-10T00:45:38.692421279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a pid=2408 runtime=io.containerd.runc.v2 May 10 00:45:38.707882 systemd[1]: Started cri-containerd-4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a.scope. May 10 00:45:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit: BPF prog-id=119 op=LOAD May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383563653663363938643930623562633562336235366666643637 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383563653663363938643930623562633562336235366666643637 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit: BPF prog-id=120 op=LOAD May 10 00:45:38.719000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000211240 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383563653663363938643930623562633562336235366666643637 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.719000 audit: BPF prog-id=121 op=LOAD May 10 00:45:38.719000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000211288 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383563653663363938643930623562633562336235366666643637 May 10 00:45:38.719000 audit: BPF prog-id=121 op=UNLOAD May 10 00:45:38.720000 audit: BPF prog-id=120 op=UNLOAD May 10 00:45:38.720000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.720000 audit: BPF prog-id=122 op=LOAD May 10 00:45:38.720000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000211698 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464383563653663363938643930623562633562336235366666643637 May 10 00:45:38.732801 env[1212]: time="2025-05-10T00:45:38.732731030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s57qj,Uid:730e1b36-845f-4d8c-af66-aa7f296e42e5,Namespace:calico-system,Attempt:0,} returns sandbox id \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\"" May 10 00:45:38.733496 kubelet[1950]: E0510 00:45:38.733470 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:39.801268 kubelet[1950]: E0510 00:45:39.801199 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:41.802411 kubelet[1950]: E0510 00:45:41.802263 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:42.728768 env[1212]: time="2025-05-10T00:45:42.728693800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.808494 env[1212]: time="2025-05-10T00:45:42.808433453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.857013 env[1212]: time="2025-05-10T00:45:42.856955707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.859543 env[1212]: time="2025-05-10T00:45:42.859404759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.860587 env[1212]: time="2025-05-10T00:45:42.859907496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:45:42.861462 env[1212]: time="2025-05-10T00:45:42.861417742Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:45:42.868520 env[1212]: time="2025-05-10T00:45:42.868461337Z" level=info msg="CreateContainer within sandbox \"230bc5e20d864848f3edae0284a40a37cfaacf65008f5ca6a2771abd7d69222a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:45:42.887064 env[1212]: time="2025-05-10T00:45:42.887006362Z" level=info msg="CreateContainer within sandbox \"230bc5e20d864848f3edae0284a40a37cfaacf65008f5ca6a2771abd7d69222a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a3f43c51454adb042e4eacc92292dc085c718f9cd8db2f69ff4eced80b827fdd\"" May 10 00:45:42.887660 env[1212]: time="2025-05-10T00:45:42.887629613Z" level=info msg="StartContainer for \"a3f43c51454adb042e4eacc92292dc085c718f9cd8db2f69ff4eced80b827fdd\"" May 10 00:45:42.904362 systemd[1]: Started cri-containerd-a3f43c51454adb042e4eacc92292dc085c718f9cd8db2f69ff4eced80b827fdd.scope. May 10 00:45:42.923871 kernel: kauditd_printk_skb: 116 callbacks suppressed May 10 00:45:42.923996 kernel: audit: type=1400 audit(1746837942.919:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929804 kernel: audit: type=1400 audit(1746837942.919:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.933163 kernel: audit: type=1400 audit(1746837942.919:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.936860 kernel: audit: type=1400 audit(1746837942.919:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.936920 kernel: audit: type=1400 audit(1746837942.919:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.943640 kernel: audit: type=1400 audit(1746837942.919:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.943697 kernel: audit: type=1400 audit(1746837942.919:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.946972 kernel: audit: type=1400 audit(1746837942.919:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.954110 kernel: audit: type=1400 audit(1746837942.919:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.954156 kernel: audit: type=1400 audit(1746837942.919:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.919000 audit: BPF prog-id=123 op=LOAD May 10 00:45:42.921000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2361 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663433633531343534616462303432653465616363393232393264 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2361 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663433633531343534616462303432653465616363393232393264 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.921000 audit: BPF prog-id=124 op=LOAD May 10 00:45:42.921000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022a950 items=0 ppid=2361 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663433633531343534616462303432653465616363393232393264 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.924000 audit: BPF prog-id=125 op=LOAD May 10 00:45:42.924000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022a998 items=0 ppid=2361 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663433633531343534616462303432653465616363393232393264 May 10 00:45:42.929000 audit: BPF prog-id=125 op=UNLOAD May 10 00:45:42.929000 audit: BPF prog-id=124 op=UNLOAD May 10 00:45:42.929000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.929000 audit: BPF prog-id=126 op=LOAD May 10 00:45:42.929000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022ada8 items=0 ppid=2361 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663433633531343534616462303432653465616363393232393264 May 10 00:45:42.990350 env[1212]: time="2025-05-10T00:45:42.990213582Z" level=info msg="StartContainer for \"a3f43c51454adb042e4eacc92292dc085c718f9cd8db2f69ff4eced80b827fdd\" returns successfully" May 10 00:45:43.802045 kubelet[1950]: E0510 00:45:43.801963 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:43.862473 kubelet[1950]: E0510 00:45:43.862436 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:43.868758 kubelet[1950]: E0510 00:45:43.868612 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.868758 kubelet[1950]: W0510 00:45:43.868641 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.868758 kubelet[1950]: E0510 00:45:43.868665 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.869570 kubelet[1950]: E0510 00:45:43.869321 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.869570 kubelet[1950]: W0510 00:45:43.869350 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.869570 kubelet[1950]: E0510 00:45:43.869362 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.869700 kubelet[1950]: E0510 00:45:43.869648 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.869700 kubelet[1950]: W0510 00:45:43.869669 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.869801 kubelet[1950]: E0510 00:45:43.869697 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.869998 kubelet[1950]: E0510 00:45:43.869967 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.869998 kubelet[1950]: W0510 00:45:43.869988 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.869998 kubelet[1950]: E0510 00:45:43.870003 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.870385 kubelet[1950]: E0510 00:45:43.870367 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.870385 kubelet[1950]: W0510 00:45:43.870381 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.870459 kubelet[1950]: E0510 00:45:43.870393 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.870628 kubelet[1950]: E0510 00:45:43.870594 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.870628 kubelet[1950]: W0510 00:45:43.870623 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.870740 kubelet[1950]: E0510 00:45:43.870635 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.870872 kubelet[1950]: E0510 00:45:43.870855 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.870872 kubelet[1950]: W0510 00:45:43.870869 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.870942 kubelet[1950]: E0510 00:45:43.870880 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.871071 kubelet[1950]: E0510 00:45:43.871056 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.871071 kubelet[1950]: W0510 00:45:43.871069 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.871257 kubelet[1950]: E0510 00:45:43.871078 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.871257 kubelet[1950]: E0510 00:45:43.871252 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.871342 kubelet[1950]: W0510 00:45:43.871262 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.871342 kubelet[1950]: E0510 00:45:43.871281 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.871489 kubelet[1950]: E0510 00:45:43.871473 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.871489 kubelet[1950]: W0510 00:45:43.871486 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.871552 kubelet[1950]: E0510 00:45:43.871496 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.871678 kubelet[1950]: E0510 00:45:43.871661 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.871678 kubelet[1950]: W0510 00:45:43.871676 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.871796 kubelet[1950]: E0510 00:45:43.871686 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.871920 kubelet[1950]: E0510 00:45:43.871900 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.871972 kubelet[1950]: W0510 00:45:43.871914 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.872008 kubelet[1950]: E0510 00:45:43.871971 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.872209 kubelet[1950]: E0510 00:45:43.872188 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.872209 kubelet[1950]: W0510 00:45:43.872202 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.872325 kubelet[1950]: E0510 00:45:43.872213 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.872445 kubelet[1950]: E0510 00:45:43.872425 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.872445 kubelet[1950]: W0510 00:45:43.872442 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.872542 kubelet[1950]: E0510 00:45:43.872458 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.872688 kubelet[1950]: E0510 00:45:43.872677 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.872688 kubelet[1950]: W0510 00:45:43.872688 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.872767 kubelet[1950]: E0510 00:45:43.872696 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.873093 kubelet[1950]: E0510 00:45:43.873070 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.873093 kubelet[1950]: W0510 00:45:43.873082 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.873093 kubelet[1950]: E0510 00:45:43.873093 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.873342 kubelet[1950]: E0510 00:45:43.873327 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.873342 kubelet[1950]: W0510 00:45:43.873338 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.873425 kubelet[1950]: E0510 00:45:43.873356 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.873616 kubelet[1950]: E0510 00:45:43.873593 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.873616 kubelet[1950]: W0510 00:45:43.873605 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.873695 kubelet[1950]: E0510 00:45:43.873620 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.873896 kubelet[1950]: E0510 00:45:43.873876 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.873896 kubelet[1950]: W0510 00:45:43.873888 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.873946 kubelet[1950]: E0510 00:45:43.873904 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.874131 kubelet[1950]: E0510 00:45:43.874111 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.874131 kubelet[1950]: W0510 00:45:43.874128 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.874389 kubelet[1950]: E0510 00:45:43.874150 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.874389 kubelet[1950]: E0510 00:45:43.874365 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.874389 kubelet[1950]: W0510 00:45:43.874375 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.874389 kubelet[1950]: E0510 00:45:43.874386 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.874674 kubelet[1950]: E0510 00:45:43.874562 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.874674 kubelet[1950]: W0510 00:45:43.874572 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.874674 kubelet[1950]: E0510 00:45:43.874583 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.875539 kubelet[1950]: I0510 00:45:43.875485 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5d6dbb95df-xqd5n" podStartSLOduration=3.408768225 podStartE2EDuration="7.875472644s" podCreationTimestamp="2025-05-10 00:45:36 +0000 UTC" firstStartedPulling="2025-05-10 00:45:38.394404083 +0000 UTC m=+19.718574661" lastFinishedPulling="2025-05-10 00:45:42.861108502 +0000 UTC m=+24.185279080" observedRunningTime="2025-05-10 00:45:43.875069388 +0000 UTC m=+25.199239966" watchObservedRunningTime="2025-05-10 00:45:43.875472644 +0000 UTC m=+25.199643222" May 10 00:45:43.876145 kubelet[1950]: E0510 00:45:43.876091 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.876145 kubelet[1950]: W0510 00:45:43.876136 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.876436 kubelet[1950]: E0510 00:45:43.876235 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.876436 kubelet[1950]: E0510 00:45:43.876380 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.876436 kubelet[1950]: W0510 00:45:43.876388 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.876767 kubelet[1950]: E0510 00:45:43.876462 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.876767 kubelet[1950]: E0510 00:45:43.876635 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.876767 kubelet[1950]: W0510 00:45:43.876648 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.876767 kubelet[1950]: E0510 00:45:43.876665 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.876934 kubelet[1950]: E0510 00:45:43.876925 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.876976 kubelet[1950]: W0510 00:45:43.876936 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.876976 kubelet[1950]: E0510 00:45:43.876951 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.877226 kubelet[1950]: E0510 00:45:43.877199 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.877226 kubelet[1950]: W0510 00:45:43.877218 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.877368 kubelet[1950]: E0510 00:45:43.877240 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.877521 kubelet[1950]: E0510 00:45:43.877484 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.877521 kubelet[1950]: W0510 00:45:43.877501 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.877521 kubelet[1950]: E0510 00:45:43.877521 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.877878 kubelet[1950]: E0510 00:45:43.877858 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.877878 kubelet[1950]: W0510 00:45:43.877877 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.877963 kubelet[1950]: E0510 00:45:43.877901 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.878135 kubelet[1950]: E0510 00:45:43.878118 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.878169 kubelet[1950]: W0510 00:45:43.878135 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.878169 kubelet[1950]: E0510 00:45:43.878154 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.878378 kubelet[1950]: E0510 00:45:43.878364 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.878411 kubelet[1950]: W0510 00:45:43.878378 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.878411 kubelet[1950]: E0510 00:45:43.878394 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.878618 kubelet[1950]: E0510 00:45:43.878604 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.878648 kubelet[1950]: W0510 00:45:43.878618 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.878648 kubelet[1950]: E0510 00:45:43.878630 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:43.879006 kubelet[1950]: E0510 00:45:43.878981 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:43.879006 kubelet[1950]: W0510 00:45:43.878997 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:43.879067 kubelet[1950]: E0510 00:45:43.879009 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.789659 env[1212]: time="2025-05-10T00:45:44.789493738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:44.793306 env[1212]: time="2025-05-10T00:45:44.793255642Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:44.796228 env[1212]: time="2025-05-10T00:45:44.796184376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:44.798607 env[1212]: time="2025-05-10T00:45:44.798519147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:44.799142 env[1212]: time="2025-05-10T00:45:44.799088156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:45:44.802096 env[1212]: time="2025-05-10T00:45:44.802027141Z" level=info msg="CreateContainer within sandbox \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:45:44.824133 env[1212]: time="2025-05-10T00:45:44.824060576Z" level=info msg="CreateContainer within sandbox \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e\"" May 10 00:45:44.825067 env[1212]: time="2025-05-10T00:45:44.825001253Z" level=info msg="StartContainer for \"fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e\"" May 10 00:45:44.847952 systemd[1]: Started cri-containerd-fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e.scope. May 10 00:45:44.869589 kubelet[1950]: I0510 00:45:44.869074 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:44.869987 kubelet[1950]: E0510 00:45:44.869600 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2091f3d058 items=0 ppid=2408 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:44.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323237396236633863636166616139663737393237613866386530 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit: BPF prog-id=127 op=LOAD May 10 00:45:44.869000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a90c8 items=0 ppid=2408 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:44.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323237396236633863636166616139663737393237613866386530 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit: BPF prog-id=128 op=LOAD May 10 00:45:44.869000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a9118 items=0 ppid=2408 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:44.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323237396236633863636166616139663737393237613866386530 May 10 00:45:44.869000 audit: BPF prog-id=128 op=UNLOAD May 10 00:45:44.869000 audit: BPF prog-id=127 op=UNLOAD May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:44.869000 audit: BPF prog-id=129 op=LOAD May 10 00:45:44.869000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a91a8 items=0 ppid=2408 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:44.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663323237396236633863636166616139663737393237613866386530 May 10 00:45:44.880859 kubelet[1950]: E0510 00:45:44.880817 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.880859 kubelet[1950]: W0510 00:45:44.880847 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.880859 kubelet[1950]: E0510 00:45:44.880875 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.882062 kubelet[1950]: E0510 00:45:44.882037 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.882062 kubelet[1950]: W0510 00:45:44.882057 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.882172 kubelet[1950]: E0510 00:45:44.882074 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.882340 kubelet[1950]: E0510 00:45:44.882322 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.882340 kubelet[1950]: W0510 00:45:44.882337 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.882537 kubelet[1950]: E0510 00:45:44.882349 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.882626 kubelet[1950]: E0510 00:45:44.882606 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.882626 kubelet[1950]: W0510 00:45:44.882616 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.882626 kubelet[1950]: E0510 00:45:44.882626 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.882876 kubelet[1950]: E0510 00:45:44.882859 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.882876 kubelet[1950]: W0510 00:45:44.882873 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.883028 kubelet[1950]: E0510 00:45:44.882884 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.883159 kubelet[1950]: E0510 00:45:44.883110 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.883159 kubelet[1950]: W0510 00:45:44.883149 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.883242 kubelet[1950]: E0510 00:45:44.883178 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.883650 kubelet[1950]: E0510 00:45:44.883631 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.883650 kubelet[1950]: W0510 00:45:44.883644 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.883650 kubelet[1950]: E0510 00:45:44.883654 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.884734 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.886757 kubelet[1950]: W0510 00:45:44.884747 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.884758 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.885024 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.886757 kubelet[1950]: W0510 00:45:44.885033 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.885042 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.885260 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.886757 kubelet[1950]: W0510 00:45:44.885271 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.885283 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.886757 kubelet[1950]: E0510 00:45:44.885506 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.887130 kubelet[1950]: W0510 00:45:44.885515 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.887130 kubelet[1950]: E0510 00:45:44.885528 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.887130 kubelet[1950]: E0510 00:45:44.885739 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.887130 kubelet[1950]: W0510 00:45:44.885747 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.887130 kubelet[1950]: E0510 00:45:44.885769 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.887130 kubelet[1950]: E0510 00:45:44.885983 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.887130 kubelet[1950]: W0510 00:45:44.885991 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.887130 kubelet[1950]: E0510 00:45:44.886000 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.887130 kubelet[1950]: E0510 00:45:44.886166 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.887130 kubelet[1950]: W0510 00:45:44.886173 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.887347 kubelet[1950]: E0510 00:45:44.886181 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.887347 kubelet[1950]: E0510 00:45:44.886320 1950 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:44.887347 kubelet[1950]: W0510 00:45:44.886343 1950 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:44.887347 kubelet[1950]: E0510 00:45:44.886356 1950 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:44.893432 env[1212]: time="2025-05-10T00:45:44.893371115Z" level=info msg="StartContainer for \"fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e\" returns successfully" May 10 00:45:44.903089 systemd[1]: cri-containerd-fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e.scope: Deactivated successfully. May 10 00:45:44.907000 audit: BPF prog-id=129 op=UNLOAD May 10 00:45:44.926927 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e-rootfs.mount: Deactivated successfully. May 10 00:45:44.954658 env[1212]: time="2025-05-10T00:45:44.954588032Z" level=info msg="shim disconnected" id=fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e May 10 00:45:44.954658 env[1212]: time="2025-05-10T00:45:44.954657667Z" level=warning msg="cleaning up after shim disconnected" id=fc2279b6c8ccafaa9f77927a8f8e033ffae9e2c659f7b20a721bce20f5f1f63e namespace=k8s.io May 10 00:45:44.954658 env[1212]: time="2025-05-10T00:45:44.954673621Z" level=info msg="cleaning up dead shim" May 10 00:45:44.963678 env[1212]: time="2025-05-10T00:45:44.963619254Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2577 runtime=io.containerd.runc.v2\n" May 10 00:45:45.807627 kubelet[1950]: E0510 00:45:45.807536 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:45.880584 kubelet[1950]: E0510 00:45:45.880513 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:45.881695 env[1212]: time="2025-05-10T00:45:45.881632743Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:45:45.984386 kubelet[1950]: I0510 00:45:45.984313 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:45.984858 kubelet[1950]: E0510 00:45:45.984835 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:46.673000 audit[2597]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:46.673000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff77572900 a2=0 a3=7fff775728ec items=0 ppid=2065 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:46.680000 audit[2597]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:46.680000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff77572900 a2=0 a3=7fff775728ec items=0 ppid=2065 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:46.872057 kubelet[1950]: E0510 00:45:46.872024 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:45:47.801479 kubelet[1950]: E0510 00:45:47.801400 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:49.801835 kubelet[1950]: E0510 00:45:49.801784 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:51.801916 kubelet[1950]: E0510 00:45:51.801842 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:53.802338 kubelet[1950]: E0510 00:45:53.802250 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:55.801374 kubelet[1950]: E0510 00:45:55.801290 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:57.801418 kubelet[1950]: E0510 00:45:57.801351 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:59.177572 env[1212]: time="2025-05-10T00:45:59.177481467Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:59.200225 env[1212]: time="2025-05-10T00:45:59.200135582Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:59.211090 env[1212]: time="2025-05-10T00:45:59.210973660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:59.237262 env[1212]: time="2025-05-10T00:45:59.237203127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:59.238125 env[1212]: time="2025-05-10T00:45:59.238056933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:45:59.240846 env[1212]: time="2025-05-10T00:45:59.240797158Z" level=info msg="CreateContainer within sandbox \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:45:59.459199 env[1212]: time="2025-05-10T00:45:59.459027835Z" level=info msg="CreateContainer within sandbox \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70\"" May 10 00:45:59.459866 env[1212]: time="2025-05-10T00:45:59.459825146Z" level=info msg="StartContainer for \"86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70\"" May 10 00:45:59.481503 systemd[1]: Started cri-containerd-86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70.scope. May 10 00:45:59.503924 kernel: kauditd_printk_skb: 97 callbacks suppressed May 10 00:45:59.504058 kernel: audit: type=1400 audit(1746837959.496:983): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3a052c3748 items=0 ppid=2408 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:59.514081 kernel: audit: type=1300 audit(1746837959.496:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3a052c3748 items=0 ppid=2408 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:59.514155 kernel: audit: type=1327 audit(1746837959.496:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643039313131663965663136653330313435303037653862353534 May 10 00:45:59.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643039313131663965663136653330313435303037653862353534 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.524203 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.524419 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.548181 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.548323 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.557371 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.557678 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.561332 kernel: audit: type=1400 audit(1746837959.496:984): avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.496000 audit: BPF prog-id=130 op=LOAD May 10 00:45:59.496000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e3eb8 items=0 ppid=2408 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:59.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643039313131663965663136653330313435303037653862353534 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.502000 audit: BPF prog-id=131 op=LOAD May 10 00:45:59.502000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e3f08 items=0 ppid=2408 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:59.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643039313131663965663136653330313435303037653862353534 May 10 00:45:59.506000 audit: BPF prog-id=131 op=UNLOAD May 10 00:45:59.507000 audit: BPF prog-id=130 op=UNLOAD May 10 00:45:59.507000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:59.507000 audit: BPF prog-id=132 op=LOAD May 10 00:45:59.507000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e3f98 items=0 ppid=2408 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:59.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643039313131663965663136653330313435303037653862353534 May 10 00:45:59.723032 env[1212]: time="2025-05-10T00:45:59.722825797Z" level=info msg="StartContainer for \"86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70\" returns successfully" May 10 00:45:59.802419 kubelet[1950]: E0510 00:45:59.802315 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:45:59.897919 kubelet[1950]: E0510 00:45:59.897882 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:00.726647 env[1212]: time="2025-05-10T00:46:00.726563495Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:46:00.728695 systemd[1]: cri-containerd-86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70.scope: Deactivated successfully. May 10 00:46:00.734000 audit: BPF prog-id=132 op=UNLOAD May 10 00:46:00.751816 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70-rootfs.mount: Deactivated successfully. May 10 00:46:00.774295 kubelet[1950]: I0510 00:46:00.774258 1950 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 10 00:46:01.162863 kubelet[1950]: E0510 00:46:01.162817 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:01.168367 systemd[1]: Created slice kubepods-besteffort-pod9bc956eb_35da_45b8_a7e6_fc3120daf6b5.slice. May 10 00:46:01.174751 systemd[1]: Created slice kubepods-besteffort-pod96bd9235_8ff6_4dae_b311_5624acc3e965.slice. May 10 00:46:01.180618 systemd[1]: Created slice kubepods-burstable-pod0761c05f_1dfa_4ec9_8d64_61199e168290.slice. May 10 00:46:01.186896 systemd[1]: Created slice kubepods-burstable-pod201db9ab_42d0_46b1_8074_10f854042d80.slice. May 10 00:46:01.193203 systemd[1]: Created slice kubepods-besteffort-pod5d47e5e0_b6ad_4c3b_8d0e_0ffab6da847b.slice. May 10 00:46:01.260259 kubelet[1950]: I0510 00:46:01.260205 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9bc956eb-35da-45b8-a7e6-fc3120daf6b5-tigera-ca-bundle\") pod \"calico-kube-controllers-576db6cf6d-x79r6\" (UID: \"9bc956eb-35da-45b8-a7e6-fc3120daf6b5\") " pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" May 10 00:46:01.260498 kubelet[1950]: I0510 00:46:01.260276 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-djb74\" (UniqueName: \"kubernetes.io/projected/96bd9235-8ff6-4dae-b311-5624acc3e965-kube-api-access-djb74\") pod \"calico-apiserver-79df748467-tz56m\" (UID: \"96bd9235-8ff6-4dae-b311-5624acc3e965\") " pod="calico-apiserver/calico-apiserver-79df748467-tz56m" May 10 00:46:01.260498 kubelet[1950]: I0510 00:46:01.260319 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/96bd9235-8ff6-4dae-b311-5624acc3e965-calico-apiserver-certs\") pod \"calico-apiserver-79df748467-tz56m\" (UID: \"96bd9235-8ff6-4dae-b311-5624acc3e965\") " pod="calico-apiserver/calico-apiserver-79df748467-tz56m" May 10 00:46:01.260498 kubelet[1950]: I0510 00:46:01.260339 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vcgps\" (UniqueName: \"kubernetes.io/projected/9bc956eb-35da-45b8-a7e6-fc3120daf6b5-kube-api-access-vcgps\") pod \"calico-kube-controllers-576db6cf6d-x79r6\" (UID: \"9bc956eb-35da-45b8-a7e6-fc3120daf6b5\") " pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" May 10 00:46:01.361542 kubelet[1950]: I0510 00:46:01.361473 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-774zd\" (UniqueName: \"kubernetes.io/projected/201db9ab-42d0-46b1-8074-10f854042d80-kube-api-access-774zd\") pod \"coredns-6f6b679f8f-7qqv8\" (UID: \"201db9ab-42d0-46b1-8074-10f854042d80\") " pod="kube-system/coredns-6f6b679f8f-7qqv8" May 10 00:46:01.361542 kubelet[1950]: I0510 00:46:01.361533 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0761c05f-1dfa-4ec9-8d64-61199e168290-config-volume\") pod \"coredns-6f6b679f8f-7gfdm\" (UID: \"0761c05f-1dfa-4ec9-8d64-61199e168290\") " pod="kube-system/coredns-6f6b679f8f-7gfdm" May 10 00:46:01.361823 kubelet[1950]: I0510 00:46:01.361560 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mnbv2\" (UniqueName: \"kubernetes.io/projected/5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b-kube-api-access-mnbv2\") pod \"calico-apiserver-79df748467-qwlvl\" (UID: \"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b\") " pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" May 10 00:46:01.361823 kubelet[1950]: I0510 00:46:01.361775 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/201db9ab-42d0-46b1-8074-10f854042d80-config-volume\") pod \"coredns-6f6b679f8f-7qqv8\" (UID: \"201db9ab-42d0-46b1-8074-10f854042d80\") " pod="kube-system/coredns-6f6b679f8f-7qqv8" May 10 00:46:01.361893 kubelet[1950]: I0510 00:46:01.361881 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b-calico-apiserver-certs\") pod \"calico-apiserver-79df748467-qwlvl\" (UID: \"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b\") " pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" May 10 00:46:01.361921 kubelet[1950]: I0510 00:46:01.361901 1950 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f2tj7\" (UniqueName: \"kubernetes.io/projected/0761c05f-1dfa-4ec9-8d64-61199e168290-kube-api-access-f2tj7\") pod \"coredns-6f6b679f8f-7gfdm\" (UID: \"0761c05f-1dfa-4ec9-8d64-61199e168290\") " pod="kube-system/coredns-6f6b679f8f-7gfdm" May 10 00:46:01.519063 env[1212]: time="2025-05-10T00:46:01.518992209Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-tz56m,Uid:96bd9235-8ff6-4dae-b311-5624acc3e965,Namespace:calico-apiserver,Attempt:0,}" May 10 00:46:01.519271 env[1212]: time="2025-05-10T00:46:01.518991889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-576db6cf6d-x79r6,Uid:9bc956eb-35da-45b8-a7e6-fc3120daf6b5,Namespace:calico-system,Attempt:0,}" May 10 00:46:01.704880 env[1212]: time="2025-05-10T00:46:01.704802436Z" level=info msg="shim disconnected" id=86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70 May 10 00:46:01.704880 env[1212]: time="2025-05-10T00:46:01.704877588Z" level=warning msg="cleaning up after shim disconnected" id=86d09111f9ef16e30145007e8b5549434c9357819dc9c48a8c50b14e6aa26b70 namespace=k8s.io May 10 00:46:01.704880 env[1212]: time="2025-05-10T00:46:01.704893802Z" level=info msg="cleaning up dead shim" May 10 00:46:01.714282 env[1212]: time="2025-05-10T00:46:01.714233101Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2660 runtime=io.containerd.runc.v2\n" May 10 00:46:01.784260 kubelet[1950]: E0510 00:46:01.784139 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:01.784797 env[1212]: time="2025-05-10T00:46:01.784738712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7gfdm,Uid:0761c05f-1dfa-4ec9-8d64-61199e168290,Namespace:kube-system,Attempt:0,}" May 10 00:46:01.791054 kubelet[1950]: E0510 00:46:01.791015 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:01.791461 env[1212]: time="2025-05-10T00:46:01.791415617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7qqv8,Uid:201db9ab-42d0-46b1-8074-10f854042d80,Namespace:kube-system,Attempt:0,}" May 10 00:46:01.797160 env[1212]: time="2025-05-10T00:46:01.797015755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-qwlvl,Uid:5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b,Namespace:calico-apiserver,Attempt:0,}" May 10 00:46:01.805866 systemd[1]: Created slice kubepods-besteffort-pod88369301_e94b_4f26_89a8_6639d6b6ee8d.slice. May 10 00:46:01.808154 env[1212]: time="2025-05-10T00:46:01.808121681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gb6dh,Uid:88369301-e94b-4f26-89a8-6639d6b6ee8d,Namespace:calico-system,Attempt:0,}" May 10 00:46:02.237419 kubelet[1950]: E0510 00:46:02.237370 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:02.238243 env[1212]: time="2025-05-10T00:46:02.238208393Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:46:04.533891 env[1212]: time="2025-05-10T00:46:04.533786730Z" level=error msg="Failed to destroy network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.536798 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08-shm.mount: Deactivated successfully. May 10 00:46:04.539385 env[1212]: time="2025-05-10T00:46:04.539304381Z" level=error msg="encountered an error cleaning up failed sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.539487 env[1212]: time="2025-05-10T00:46:04.539400987Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-tz56m,Uid:96bd9235-8ff6-4dae-b311-5624acc3e965,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.541751 kubelet[1950]: E0510 00:46:04.539699 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.541751 kubelet[1950]: E0510 00:46:04.539837 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79df748467-tz56m" May 10 00:46:04.541751 kubelet[1950]: E0510 00:46:04.539867 1950 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79df748467-tz56m" May 10 00:46:04.542180 env[1212]: time="2025-05-10T00:46:04.541404143Z" level=error msg="Failed to destroy network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.542180 env[1212]: time="2025-05-10T00:46:04.541937191Z" level=error msg="encountered an error cleaning up failed sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.542180 env[1212]: time="2025-05-10T00:46:04.542014138Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-576db6cf6d-x79r6,Uid:9bc956eb-35da-45b8-a7e6-fc3120daf6b5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.542334 kubelet[1950]: E0510 00:46:04.539923 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-79df748467-tz56m_calico-apiserver(96bd9235-8ff6-4dae-b311-5624acc3e965)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-79df748467-tz56m_calico-apiserver(96bd9235-8ff6-4dae-b311-5624acc3e965)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79df748467-tz56m" podUID="96bd9235-8ff6-4dae-b311-5624acc3e965" May 10 00:46:04.542334 kubelet[1950]: E0510 00:46:04.542261 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.542465 kubelet[1950]: E0510 00:46:04.542330 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" May 10 00:46:04.542465 kubelet[1950]: E0510 00:46:04.542365 1950 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" May 10 00:46:04.542465 kubelet[1950]: E0510 00:46:04.542450 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-576db6cf6d-x79r6_calico-system(9bc956eb-35da-45b8-a7e6-fc3120daf6b5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-576db6cf6d-x79r6_calico-system(9bc956eb-35da-45b8-a7e6-fc3120daf6b5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" podUID="9bc956eb-35da-45b8-a7e6-fc3120daf6b5" May 10 00:46:04.705984 env[1212]: time="2025-05-10T00:46:04.705906192Z" level=error msg="Failed to destroy network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.706337 env[1212]: time="2025-05-10T00:46:04.706308637Z" level=error msg="encountered an error cleaning up failed sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.706416 env[1212]: time="2025-05-10T00:46:04.706360212Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7gfdm,Uid:0761c05f-1dfa-4ec9-8d64-61199e168290,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.706663 kubelet[1950]: E0510 00:46:04.706617 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.706765 kubelet[1950]: E0510 00:46:04.706685 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-7gfdm" May 10 00:46:04.706765 kubelet[1950]: E0510 00:46:04.706719 1950 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-7gfdm" May 10 00:46:04.706841 kubelet[1950]: E0510 00:46:04.706764 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-7gfdm_kube-system(0761c05f-1dfa-4ec9-8d64-61199e168290)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-7gfdm_kube-system(0761c05f-1dfa-4ec9-8d64-61199e168290)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-7gfdm" podUID="0761c05f-1dfa-4ec9-8d64-61199e168290" May 10 00:46:04.719676 env[1212]: time="2025-05-10T00:46:04.719610790Z" level=error msg="Failed to destroy network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.720285 env[1212]: time="2025-05-10T00:46:04.720222318Z" level=error msg="encountered an error cleaning up failed sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.720402 env[1212]: time="2025-05-10T00:46:04.720304835Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7qqv8,Uid:201db9ab-42d0-46b1-8074-10f854042d80,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.720636 kubelet[1950]: E0510 00:46:04.720578 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.720729 kubelet[1950]: E0510 00:46:04.720669 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-7qqv8" May 10 00:46:04.720729 kubelet[1950]: E0510 00:46:04.720690 1950 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-7qqv8" May 10 00:46:04.720818 kubelet[1950]: E0510 00:46:04.720760 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-7qqv8_kube-system(201db9ab-42d0-46b1-8074-10f854042d80)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-7qqv8_kube-system(201db9ab-42d0-46b1-8074-10f854042d80)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-7qqv8" podUID="201db9ab-42d0-46b1-8074-10f854042d80" May 10 00:46:04.733272 env[1212]: time="2025-05-10T00:46:04.733194884Z" level=error msg="Failed to destroy network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.733654 env[1212]: time="2025-05-10T00:46:04.733613562Z" level=error msg="encountered an error cleaning up failed sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.733727 env[1212]: time="2025-05-10T00:46:04.733678383Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-qwlvl,Uid:5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.733983 kubelet[1950]: E0510 00:46:04.733941 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.734078 kubelet[1950]: E0510 00:46:04.734024 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" May 10 00:46:04.734078 kubelet[1950]: E0510 00:46:04.734060 1950 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" May 10 00:46:04.734155 kubelet[1950]: E0510 00:46:04.734126 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-79df748467-qwlvl_calico-apiserver(5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-79df748467-qwlvl_calico-apiserver(5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" podUID="5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b" May 10 00:46:04.747513 env[1212]: time="2025-05-10T00:46:04.747406088Z" level=error msg="Failed to destroy network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.747841 env[1212]: time="2025-05-10T00:46:04.747801819Z" level=error msg="encountered an error cleaning up failed sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.747913 env[1212]: time="2025-05-10T00:46:04.747857993Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gb6dh,Uid:88369301-e94b-4f26-89a8-6639d6b6ee8d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.748161 kubelet[1950]: E0510 00:46:04.748119 1950 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:04.748261 kubelet[1950]: E0510 00:46:04.748193 1950 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gb6dh" May 10 00:46:04.748261 kubelet[1950]: E0510 00:46:04.748216 1950 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gb6dh" May 10 00:46:04.748339 kubelet[1950]: E0510 00:46:04.748260 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gb6dh_calico-system(88369301-e94b-4f26-89a8-6639d6b6ee8d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gb6dh_calico-system(88369301-e94b-4f26-89a8-6639d6b6ee8d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:46:05.243838 kubelet[1950]: I0510 00:46:05.243791 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:05.244534 env[1212]: time="2025-05-10T00:46:05.244487640Z" level=info msg="StopPodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\"" May 10 00:46:05.245587 kubelet[1950]: I0510 00:46:05.244924 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" May 10 00:46:05.245662 env[1212]: time="2025-05-10T00:46:05.245504658Z" level=info msg="StopPodSandbox for \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\"" May 10 00:46:05.247019 kubelet[1950]: I0510 00:46:05.246983 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" May 10 00:46:05.247588 env[1212]: time="2025-05-10T00:46:05.247535577Z" level=info msg="StopPodSandbox for \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\"" May 10 00:46:05.249189 kubelet[1950]: I0510 00:46:05.249152 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" May 10 00:46:05.249884 env[1212]: time="2025-05-10T00:46:05.249818836Z" level=info msg="StopPodSandbox for \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\"" May 10 00:46:05.251761 kubelet[1950]: I0510 00:46:05.251679 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:05.252327 env[1212]: time="2025-05-10T00:46:05.252296399Z" level=info msg="StopPodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\"" May 10 00:46:05.253876 kubelet[1950]: I0510 00:46:05.253465 1950 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" May 10 00:46:05.254092 env[1212]: time="2025-05-10T00:46:05.254068504Z" level=info msg="StopPodSandbox for \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\"" May 10 00:46:05.292641 env[1212]: time="2025-05-10T00:46:05.292549918Z" level=error msg="StopPodSandbox for \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\" failed" error="failed to destroy network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:05.292977 kubelet[1950]: E0510 00:46:05.292919 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" May 10 00:46:05.293069 kubelet[1950]: E0510 00:46:05.293008 1950 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5"} May 10 00:46:05.293114 kubelet[1950]: E0510 00:46:05.293087 1950 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9bc956eb-35da-45b8-a7e6-fc3120daf6b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:05.293267 kubelet[1950]: E0510 00:46:05.293129 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9bc956eb-35da-45b8-a7e6-fc3120daf6b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" podUID="9bc956eb-35da-45b8-a7e6-fc3120daf6b5" May 10 00:46:05.302299 env[1212]: time="2025-05-10T00:46:05.302215443Z" level=error msg="StopPodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" failed" error="failed to destroy network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:05.303078 kubelet[1950]: E0510 00:46:05.302869 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:05.303078 kubelet[1950]: E0510 00:46:05.302940 1950 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4"} May 10 00:46:05.303078 kubelet[1950]: E0510 00:46:05.303002 1950 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0761c05f-1dfa-4ec9-8d64-61199e168290\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:05.303078 kubelet[1950]: E0510 00:46:05.303037 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0761c05f-1dfa-4ec9-8d64-61199e168290\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-7gfdm" podUID="0761c05f-1dfa-4ec9-8d64-61199e168290" May 10 00:46:05.320123 env[1212]: time="2025-05-10T00:46:05.320047420Z" level=error msg="StopPodSandbox for \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\" failed" error="failed to destroy network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:05.320758 kubelet[1950]: E0510 00:46:05.320693 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" May 10 00:46:05.320833 kubelet[1950]: E0510 00:46:05.320779 1950 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa"} May 10 00:46:05.320864 kubelet[1950]: E0510 00:46:05.320837 1950 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88369301-e94b-4f26-89a8-6639d6b6ee8d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:05.320934 kubelet[1950]: E0510 00:46:05.320869 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88369301-e94b-4f26-89a8-6639d6b6ee8d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gb6dh" podUID="88369301-e94b-4f26-89a8-6639d6b6ee8d" May 10 00:46:05.334819 env[1212]: time="2025-05-10T00:46:05.334740526Z" level=error msg="StopPodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" failed" error="failed to destroy network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:05.335595 kubelet[1950]: E0510 00:46:05.335347 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:05.335595 kubelet[1950]: E0510 00:46:05.335418 1950 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73"} May 10 00:46:05.335595 kubelet[1950]: E0510 00:46:05.335490 1950 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:05.335595 kubelet[1950]: E0510 00:46:05.335523 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" podUID="5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b" May 10 00:46:05.338447 env[1212]: time="2025-05-10T00:46:05.338277130Z" level=error msg="StopPodSandbox for \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\" failed" error="failed to destroy network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:05.338758 kubelet[1950]: E0510 00:46:05.338678 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" May 10 00:46:05.338827 kubelet[1950]: E0510 00:46:05.338766 1950 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08"} May 10 00:46:05.338872 kubelet[1950]: E0510 00:46:05.338824 1950 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"96bd9235-8ff6-4dae-b311-5624acc3e965\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:05.338872 kubelet[1950]: E0510 00:46:05.338858 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"96bd9235-8ff6-4dae-b311-5624acc3e965\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79df748467-tz56m" podUID="96bd9235-8ff6-4dae-b311-5624acc3e965" May 10 00:46:05.347077 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4-shm.mount: Deactivated successfully. May 10 00:46:05.347202 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5-shm.mount: Deactivated successfully. May 10 00:46:05.349153 env[1212]: time="2025-05-10T00:46:05.349076360Z" level=error msg="StopPodSandbox for \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\" failed" error="failed to destroy network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:05.349455 kubelet[1950]: E0510 00:46:05.349402 1950 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" May 10 00:46:05.349600 kubelet[1950]: E0510 00:46:05.349486 1950 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0"} May 10 00:46:05.349600 kubelet[1950]: E0510 00:46:05.349577 1950 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"201db9ab-42d0-46b1-8074-10f854042d80\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:05.349758 kubelet[1950]: E0510 00:46:05.349605 1950 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"201db9ab-42d0-46b1-8074-10f854042d80\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-7qqv8" podUID="201db9ab-42d0-46b1-8074-10f854042d80" May 10 00:46:05.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.116:22-10.0.0.1:48904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:05.554281 systemd[1]: Started sshd@7-10.0.0.116:22-10.0.0.1:48904.service. May 10 00:46:05.559294 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:46:05.559341 kernel: audit: type=1130 audit(1746837965.553:990): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.116:22-10.0.0.1:48904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:05.594000 audit[3043]: USER_ACCT pid=3043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.595380 sshd[3043]: Accepted publickey for core from 10.0.0.1 port 48904 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:05.599000 audit[3043]: CRED_ACQ pid=3043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.600605 sshd[3043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:05.604057 kernel: audit: type=1101 audit(1746837965.594:991): pid=3043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.604234 kernel: audit: type=1103 audit(1746837965.599:992): pid=3043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.604262 kernel: audit: type=1006 audit(1746837965.599:993): pid=3043 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:46:05.604836 systemd-logind[1200]: New session 8 of user core. May 10 00:46:05.605614 systemd[1]: Started session-8.scope. May 10 00:46:05.599000 audit[3043]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc31c8eb0 a2=3 a3=0 items=0 ppid=1 pid=3043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.610823 kernel: audit: type=1300 audit(1746837965.599:993): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc31c8eb0 a2=3 a3=0 items=0 ppid=1 pid=3043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:05.612433 kernel: audit: type=1327 audit(1746837965.599:993): proctitle=737368643A20636F7265205B707269765D May 10 00:46:05.609000 audit[3043]: USER_START pid=3043 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.617215 kernel: audit: type=1105 audit(1746837965.609:994): pid=3043 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.617471 kernel: audit: type=1103 audit(1746837965.611:995): pid=3045 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.611000 audit[3045]: CRED_ACQ pid=3045 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.743448 sshd[3043]: pam_unix(sshd:session): session closed for user core May 10 00:46:05.744000 audit[3043]: USER_END pid=3043 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.744000 audit[3043]: CRED_DISP pid=3043 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.746436 systemd[1]: sshd@7-10.0.0.116:22-10.0.0.1:48904.service: Deactivated successfully. May 10 00:46:05.747222 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:46:05.748142 systemd-logind[1200]: Session 8 logged out. Waiting for processes to exit. May 10 00:46:05.748973 systemd-logind[1200]: Removed session 8. May 10 00:46:05.755004 kernel: audit: type=1106 audit(1746837965.744:996): pid=3043 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.755074 kernel: audit: type=1104 audit(1746837965.744:997): pid=3043 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:05.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.116:22-10.0.0.1:48904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.748268 systemd[1]: Started sshd@8-10.0.0.116:22-10.0.0.1:37404.service. May 10 00:46:10.754656 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:10.754797 kernel: audit: type=1130 audit(1746837970.747:999): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.116:22-10.0.0.1:37404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.116:22-10.0.0.1:37404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.784000 audit[3057]: USER_ACCT pid=3057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.787982 sshd[3057]: Accepted publickey for core from 10.0.0.1 port 37404 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:10.797743 kernel: audit: type=1101 audit(1746837970.784:1000): pid=3057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.797924 kernel: audit: type=1103 audit(1746837970.789:1001): pid=3057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.789000 audit[3057]: CRED_ACQ pid=3057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.791995 sshd[3057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:10.805762 kernel: audit: type=1006 audit(1746837970.789:1002): pid=3057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:46:10.805890 kernel: audit: type=1300 audit(1746837970.789:1002): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8c8e6810 a2=3 a3=0 items=0 ppid=1 pid=3057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.789000 audit[3057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8c8e6810 a2=3 a3=0 items=0 ppid=1 pid=3057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.804544 systemd[1]: Started session-9.scope. May 10 00:46:10.805793 systemd-logind[1200]: New session 9 of user core. May 10 00:46:10.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:10.808772 kernel: audit: type=1327 audit(1746837970.789:1002): proctitle=737368643A20636F7265205B707269765D May 10 00:46:10.810000 audit[3057]: USER_START pid=3057 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.812000 audit[3059]: CRED_ACQ pid=3059 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.821219 kernel: audit: type=1105 audit(1746837970.810:1003): pid=3057 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.821297 kernel: audit: type=1103 audit(1746837970.812:1004): pid=3059 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.968876 sshd[3057]: pam_unix(sshd:session): session closed for user core May 10 00:46:10.968000 audit[3057]: USER_END pid=3057 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.972430 systemd[1]: sshd@8-10.0.0.116:22-10.0.0.1:37404.service: Deactivated successfully. May 10 00:46:10.973347 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:46:10.974675 systemd-logind[1200]: Session 9 logged out. Waiting for processes to exit. May 10 00:46:10.975792 kernel: audit: type=1106 audit(1746837970.968:1005): pid=3057 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.975996 systemd-logind[1200]: Removed session 9. May 10 00:46:10.968000 audit[3057]: CRED_DISP pid=3057 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:10.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.116:22-10.0.0.1:37404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.983784 kernel: audit: type=1104 audit(1746837970.968:1006): pid=3057 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:12.617000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:12.617000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:12.617000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00125e4e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:46:12.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:12.617000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001d2960 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:46:12.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:13.361675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3788597192.mount: Deactivated successfully. May 10 00:46:14.214000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:14.214000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:14.214000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:14.214000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:14.214000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a06cae0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:46:14.214000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00790c4c0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:46:14.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:14.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:14.214000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a1da570 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:46:14.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:14.214000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00a326660 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:46:14.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:14.216000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:14.216000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00a037950 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:46:14.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:14.216000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:14.216000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009a76ae0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:46:14.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:46:14.227119 env[1212]: time="2025-05-10T00:46:14.227067245Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.230164 env[1212]: time="2025-05-10T00:46:14.230100150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.231899 env[1212]: time="2025-05-10T00:46:14.231861966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.234055 env[1212]: time="2025-05-10T00:46:14.234001967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:14.234519 env[1212]: time="2025-05-10T00:46:14.234467008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:46:14.248866 env[1212]: time="2025-05-10T00:46:14.248806081Z" level=info msg="CreateContainer within sandbox \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:46:14.274092 env[1212]: time="2025-05-10T00:46:14.274025622Z" level=info msg="CreateContainer within sandbox \"4d85ce6c698d90b5bc5b3b56ffd674b811ea1b45d797adbee43dbdde18af8b7a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"479a90e3b9da3dd0c84559178c65413840cd6cc9a9339426effb24d6dcd42eb3\"" May 10 00:46:14.274965 env[1212]: time="2025-05-10T00:46:14.274914690Z" level=info msg="StartContainer for \"479a90e3b9da3dd0c84559178c65413840cd6cc9a9339426effb24d6dcd42eb3\"" May 10 00:46:14.292096 systemd[1]: Started cri-containerd-479a90e3b9da3dd0c84559178c65413840cd6cc9a9339426effb24d6dcd42eb3.scope. May 10 00:46:14.309000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4b04f2b608 items=0 ppid=2408 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437396139306533623964613364643063383435353931373863363534 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.309000 audit: BPF prog-id=133 op=LOAD May 10 00:46:14.309000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00031d018 items=0 ppid=2408 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437396139306533623964613364643063383435353931373863363534 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit: BPF prog-id=134 op=LOAD May 10 00:46:14.310000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00031d068 items=0 ppid=2408 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437396139306533623964613364643063383435353931373863363534 May 10 00:46:14.310000 audit: BPF prog-id=134 op=UNLOAD May 10 00:46:14.310000 audit: BPF prog-id=133 op=UNLOAD May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:14.310000 audit: BPF prog-id=135 op=LOAD May 10 00:46:14.310000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00031d0f8 items=0 ppid=2408 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437396139306533623964613364643063383435353931373863363534 May 10 00:46:14.491738 env[1212]: time="2025-05-10T00:46:14.491668326Z" level=info msg="StartContainer for \"479a90e3b9da3dd0c84559178c65413840cd6cc9a9339426effb24d6dcd42eb3\" returns successfully" May 10 00:46:14.538955 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:46:14.539329 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:46:15.497617 kubelet[1950]: E0510 00:46:15.497573 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:15.773356 kubelet[1950]: I0510 00:46:15.773179 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-s57qj" podStartSLOduration=2.271745029 podStartE2EDuration="37.773158562s" podCreationTimestamp="2025-05-10 00:45:38 +0000 UTC" firstStartedPulling="2025-05-10 00:45:38.734101315 +0000 UTC m=+20.058271893" lastFinishedPulling="2025-05-10 00:46:14.235514858 +0000 UTC m=+55.559685426" observedRunningTime="2025-05-10 00:46:15.772629445 +0000 UTC m=+57.096800043" watchObservedRunningTime="2025-05-10 00:46:15.773158562 +0000 UTC m=+57.097329141" May 10 00:46:15.802214 env[1212]: time="2025-05-10T00:46:15.802157873Z" level=info msg="StopPodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\"" May 10 00:46:15.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.116:22-10.0.0.1:37418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:15.973908 systemd[1]: Started sshd@9-10.0.0.116:22-10.0.0.1:37418.service. May 10 00:46:15.975243 kernel: kauditd_printk_skb: 68 callbacks suppressed May 10 00:46:15.975311 kernel: audit: type=1130 audit(1746837975.973:1022): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.116:22-10.0.0.1:37418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:16.022000 audit[3260]: AVC avc: denied { write } for pid=3260 comm="tee" name="fd" dev="proc" ino=25822 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.022000 audit[3260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0caeca2e a2=241 a3=1b6 items=1 ppid=3204 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.032064 kernel: audit: type=1400 audit(1746837976.022:1023): avc: denied { write } for pid=3260 comm="tee" name="fd" dev="proc" ino=25822 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.032209 kernel: audit: type=1300 audit(1746837976.022:1023): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0caeca2e a2=241 a3=1b6 items=1 ppid=3204 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.033818 kernel: audit: type=1307 audit(1746837976.022:1023): cwd="/etc/service/enabled/felix/log" May 10 00:46:16.022000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:46:16.037722 kernel: audit: type=1302 audit(1746837976.022:1023): item=0 name="/dev/fd/63" inode=24173 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.022000 audit: PATH item=0 name="/dev/fd/63" inode=24173 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.022000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.042778 kernel: audit: type=1327 audit(1746837976.022:1023): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.024000 audit[3241]: AVC avc: denied { write } for pid=3241 comm="tee" name="fd" dev="proc" ino=24179 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.047141 kernel: audit: type=1400 audit(1746837976.024:1024): avc: denied { write } for pid=3241 comm="tee" name="fd" dev="proc" ino=24179 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.024000 audit[3241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde9c32a2f a2=241 a3=1b6 items=1 ppid=3202 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.058777 kernel: audit: type=1300 audit(1746837976.024:1024): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde9c32a2f a2=241 a3=1b6 items=1 ppid=3202 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.058822 sshd[3193]: Accepted publickey for core from 10.0.0.1 port 37418 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:16.062803 kernel: audit: type=1307 audit(1746837976.024:1024): cwd="/etc/service/enabled/bird/log" May 10 00:46:16.024000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:46:16.061942 sshd[3193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:16.024000 audit: PATH item=0 name="/dev/fd/63" inode=25107 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.069426 systemd[1]: Started session-10.scope. May 10 00:46:16.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.073302 systemd-logind[1200]: New session 10 of user core. May 10 00:46:16.025000 audit[3258]: AVC avc: denied { write } for pid=3258 comm="tee" name="fd" dev="proc" ino=24183 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.073829 kernel: audit: type=1302 audit(1746837976.024:1024): item=0 name="/dev/fd/63" inode=25107 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.025000 audit[3258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5517ea1f a2=241 a3=1b6 items=1 ppid=3207 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.025000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:46:16.025000 audit: PATH item=0 name="/dev/fd/63" inode=24172 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.026000 audit[3253]: AVC avc: denied { write } for pid=3253 comm="tee" name="fd" dev="proc" ino=24187 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.026000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedc233a1e a2=241 a3=1b6 items=1 ppid=3215 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.026000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:46:16.026000 audit: PATH item=0 name="/dev/fd/63" inode=24167 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.026000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.026000 audit[3251]: AVC avc: denied { write } for pid=3251 comm="tee" name="fd" dev="proc" ino=24189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.026000 audit[3251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc7777a30 a2=241 a3=1b6 items=1 ppid=3209 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.026000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:46:16.026000 audit: PATH item=0 name="/dev/fd/63" inode=25113 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.026000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.035000 audit[3266]: AVC avc: denied { write } for pid=3266 comm="tee" name="fd" dev="proc" ino=24196 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.035000 audit[3266]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbb350a2e a2=241 a3=1b6 items=1 ppid=3210 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.035000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:46:16.035000 audit: PATH item=0 name="/dev/fd/63" inode=24176 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.047000 audit[3281]: AVC avc: denied { write } for pid=3281 comm="tee" name="fd" dev="proc" ino=25827 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:16.047000 audit[3281]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc4907a2e a2=241 a3=1b6 items=1 ppid=3234 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.047000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:46:16.047000 audit: PATH item=0 name="/dev/fd/63" inode=25824 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:16.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:16.050000 audit[3193]: USER_ACCT pid=3193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:16.057000 audit[3193]: CRED_ACQ pid=3193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:16.057000 audit[3193]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe353bd4a0 a2=3 a3=0 items=0 ppid=1 pid=3193 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.057000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:16.078000 audit[3193]: USER_START pid=3193 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:16.080000 audit[3288]: CRED_ACQ pid=3288 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:16.174000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.174000 audit: BPF prog-id=136 op=LOAD May 10 00:46:16.174000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe73b2e870 a2=98 a3=3 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.174000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.175000 audit: BPF prog-id=136 op=UNLOAD May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit: BPF prog-id=137 op=LOAD May 10 00:46:16.175000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe73b2e650 a2=74 a3=540051 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.175000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.175000 audit: BPF prog-id=137 op=UNLOAD May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.175000 audit: BPF prog-id=138 op=LOAD May 10 00:46:16.175000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe73b2e680 a2=94 a3=2 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.175000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.175000 audit: BPF prog-id=138 op=UNLOAD May 10 00:46:16.256444 sshd[3193]: pam_unix(sshd:session): session closed for user core May 10 00:46:16.257000 audit[3193]: USER_END pid=3193 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:16.257000 audit[3193]: CRED_DISP pid=3193 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:16.259406 systemd[1]: sshd@9-10.0.0.116:22-10.0.0.1:37418.service: Deactivated successfully. May 10 00:46:16.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.116:22-10.0.0.1:37418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:16.260792 systemd-logind[1200]: Session 10 logged out. Waiting for processes to exit. May 10 00:46:16.260793 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:46:16.261902 systemd-logind[1200]: Removed session 10. May 10 00:46:16.299000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.299000 audit: BPF prog-id=139 op=LOAD May 10 00:46:16.299000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe73b2e540 a2=40 a3=1 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.300000 audit: BPF prog-id=139 op=UNLOAD May 10 00:46:16.300000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.300000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe73b2e610 a2=50 a3=7ffe73b2e6f0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe73b2e550 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe73b2e580 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe73b2e490 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe73b2e5a0 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe73b2e580 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe73b2e570 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe73b2e5a0 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe73b2e580 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe73b2e5a0 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe73b2e570 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe73b2e5e0 a2=28 a3=0 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe73b2e390 a2=50 a3=1 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit: BPF prog-id=140 op=LOAD May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe73b2e390 a2=94 a3=5 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit: BPF prog-id=140 op=UNLOAD May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe73b2e440 a2=50 a3=1 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe73b2e560 a2=4 a3=38 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.308000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:16.308000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe73b2e5b0 a2=94 a3=6 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:16.309000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe73b2dd60 a2=94 a3=83 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.309000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.309000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:16.309000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe73b2dd60 a2=94 a3=83 items=0 ppid=3208 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.309000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit: BPF prog-id=141 op=LOAD May 10 00:46:16.317000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd0840880 a2=98 a3=1999999999999999 items=0 ppid=3208 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:16.317000 audit: BPF prog-id=141 op=UNLOAD May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit: BPF prog-id=142 op=LOAD May 10 00:46:16.317000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd0840760 a2=74 a3=ffff items=0 ppid=3208 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:16.317000 audit: BPF prog-id=142 op=UNLOAD May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.317000 audit: BPF prog-id=143 op=LOAD May 10 00:46:16.317000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd08407a0 a2=40 a3=7ffdd0840980 items=0 ppid=3208 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:16.317000 audit: BPF prog-id=143 op=UNLOAD May 10 00:46:16.367115 systemd-networkd[1022]: vxlan.calico: Link UP May 10 00:46:16.367124 systemd-networkd[1022]: vxlan.calico: Gained carrier May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:15.895 [INFO][3178] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:15.895 [INFO][3178] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" iface="eth0" netns="/var/run/netns/cni-08658e3a-28c1-d3f9-84ed-1505e7a2befa" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:15.895 [INFO][3178] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" iface="eth0" netns="/var/run/netns/cni-08658e3a-28c1-d3f9-84ed-1505e7a2befa" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:15.897 [INFO][3178] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" iface="eth0" netns="/var/run/netns/cni-08658e3a-28c1-d3f9-84ed-1505e7a2befa" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:15.897 [INFO][3178] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:15.897 [INFO][3178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.306 [INFO][3187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.329 [INFO][3187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.329 [INFO][3187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.354 [WARNING][3187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.354 [INFO][3187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.369 [INFO][3187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:16.373536 env[1212]: 2025-05-10 00:46:16.371 [INFO][3178] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:16.374089 env[1212]: time="2025-05-10T00:46:16.373699154Z" level=info msg="TearDown network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" successfully" May 10 00:46:16.374089 env[1212]: time="2025-05-10T00:46:16.373765693Z" level=info msg="StopPodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" returns successfully" May 10 00:46:16.374347 kubelet[1950]: E0510 00:46:16.374292 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:16.376271 systemd[1]: run-netns-cni\x2d08658e3a\x2d28c1\x2dd3f9\x2d84ed\x2d1505e7a2befa.mount: Deactivated successfully. May 10 00:46:16.376851 env[1212]: time="2025-05-10T00:46:16.376777005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7gfdm,Uid:0761c05f-1dfa-4ec9-8d64-61199e168290,Namespace:kube-system,Attempt:1,}" May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit: BPF prog-id=144 op=LOAD May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff934c1440 a2=98 a3=ffffffff items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit: BPF prog-id=144 op=UNLOAD May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit: BPF prog-id=145 op=LOAD May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff934c1250 a2=74 a3=540051 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit: BPF prog-id=145 op=UNLOAD May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit: BPF prog-id=146 op=LOAD May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff934c1280 a2=94 a3=2 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit: BPF prog-id=146 op=UNLOAD May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff934c1150 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff934c1180 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff934c1090 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff934c11a0 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff934c1180 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff934c1170 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff934c11a0 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff934c1180 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff934c11a0 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff934c1170 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff934c11e0 a2=28 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.455000 audit: BPF prog-id=147 op=LOAD May 10 00:46:16.455000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff934c1050 a2=40 a3=0 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.456000 audit: BPF prog-id=147 op=UNLOAD May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff934c1040 a2=50 a3=2800 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.456000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff934c1040 a2=50 a3=2800 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.456000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit: BPF prog-id=148 op=LOAD May 10 00:46:16.456000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff934c0860 a2=94 a3=2 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.456000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.456000 audit: BPF prog-id=148 op=UNLOAD May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.456000 audit: BPF prog-id=149 op=LOAD May 10 00:46:16.456000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff934c0960 a2=94 a3=30 items=0 ppid=3208 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.456000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit: BPF prog-id=150 op=LOAD May 10 00:46:16.465000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5b025940 a2=98 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.465000 audit: BPF prog-id=150 op=UNLOAD May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit: BPF prog-id=151 op=LOAD May 10 00:46:16.465000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe5b025720 a2=74 a3=540051 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.465000 audit: BPF prog-id=151 op=UNLOAD May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.465000 audit: BPF prog-id=152 op=LOAD May 10 00:46:16.465000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe5b025750 a2=94 a3=2 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.465000 audit: BPF prog-id=152 op=UNLOAD May 10 00:46:16.500020 kubelet[1950]: E0510 00:46:16.499751 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:16.599000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.599000 audit: BPF prog-id=153 op=LOAD May 10 00:46:16.599000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe5b025610 a2=40 a3=1 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.599000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.600000 audit: BPF prog-id=153 op=UNLOAD May 10 00:46:16.600000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.600000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe5b0256e0 a2=50 a3=7ffe5b0257c0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.600000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5b025620 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5b025650 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5b025560 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5b025670 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5b025650 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5b025640 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5b025670 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5b025650 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5b025670 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5b025640 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.609000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.609000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5b0256b0 a2=28 a3=0 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.609000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe5b025460 a2=50 a3=1 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit: BPF prog-id=154 op=LOAD May 10 00:46:16.610000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe5b025460 a2=94 a3=5 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.610000 audit: BPF prog-id=154 op=UNLOAD May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe5b025510 a2=50 a3=1 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe5b025630 a2=4 a3=38 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.610000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:16.610000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe5b025680 a2=94 a3=6 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.611000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:16.611000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe5b024e30 a2=94 a3=83 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.612000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:16.612000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe5b024e30 a2=94 a3=83 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.614000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.614000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe5b026870 a2=10 a3=208 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.614000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.614000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.614000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe5b026710 a2=10 a3=3 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.614000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.614000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.614000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe5b0266b0 a2=10 a3=3 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.614000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.614000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.614000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe5b0266b0 a2=10 a3=7 items=0 ppid=3208 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.614000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:16.620000 audit: BPF prog-id=149 op=UNLOAD May 10 00:46:16.620000 audit[1143]: SYSCALL arch=c000003e syscall=0 success=yes exit=928 a0=17 a1=7ffd525f81b0 a2=4000 a3=1000 items=0 ppid=1 pid=1143 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.620000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" May 10 00:46:16.679000 audit[3441]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:16.679000 audit[3441]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe26e89200 a2=0 a3=7ffe26e891ec items=0 ppid=3208 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:16.686000 audit[3445]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:16.686000 audit[3445]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe33ad5c10 a2=0 a3=7ffe33ad5bfc items=0 ppid=3208 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.686000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:16.688000 audit[3440]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=3440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:16.688000 audit[3440]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcb5a55840 a2=0 a3=7ffcb5a5582c items=0 ppid=3208 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:16.694000 audit[3439]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=3439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:16.694000 audit[3439]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff40f2c010 a2=0 a3=7fff40f2bffc items=0 ppid=3208 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.694000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:16.735742 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic13b8081bb7: link becomes ready May 10 00:46:16.738581 systemd-networkd[1022]: calic13b8081bb7: Link UP May 10 00:46:16.738836 systemd-networkd[1022]: calic13b8081bb7: Gained carrier May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.640 [INFO][3398] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0 coredns-6f6b679f8f- kube-system 0761c05f-1dfa-4ec9-8d64-61199e168290 894 0 2025-05-10 00:45:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-7gfdm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic13b8081bb7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.640 [INFO][3398] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.679 [INFO][3424] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" HandleID="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.693 [INFO][3424] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" HandleID="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003aa270), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-7gfdm", "timestamp":"2025-05-10 00:46:16.67989411 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.694 [INFO][3424] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.694 [INFO][3424] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.694 [INFO][3424] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.696 [INFO][3424] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.703 [INFO][3424] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.709 [INFO][3424] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.711 [INFO][3424] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.713 [INFO][3424] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.714 [INFO][3424] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.716 [INFO][3424] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701 May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.722 [INFO][3424] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.728 [INFO][3424] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.728 [INFO][3424] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" host="localhost" May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.728 [INFO][3424] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:16.750057 env[1212]: 2025-05-10 00:46:16.729 [INFO][3424] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" HandleID="k8s-pod-network.66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.751315 env[1212]: 2025-05-10 00:46:16.731 [INFO][3398] cni-plugin/k8s.go 386: Populated endpoint ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0761c05f-1dfa-4ec9-8d64-61199e168290", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-7gfdm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic13b8081bb7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:16.751315 env[1212]: 2025-05-10 00:46:16.731 [INFO][3398] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.751315 env[1212]: 2025-05-10 00:46:16.731 [INFO][3398] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic13b8081bb7 ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.751315 env[1212]: 2025-05-10 00:46:16.735 [INFO][3398] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.751315 env[1212]: 2025-05-10 00:46:16.735 [INFO][3398] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0761c05f-1dfa-4ec9-8d64-61199e168290", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701", Pod:"coredns-6f6b679f8f-7gfdm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic13b8081bb7", MAC:"22:bc:5d:78:1f:28", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:16.751315 env[1212]: 2025-05-10 00:46:16.748 [INFO][3398] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701" Namespace="kube-system" Pod="coredns-6f6b679f8f-7gfdm" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:16.760000 audit[3465]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3465 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:16.760000 audit[3465]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd5cbae530 a2=0 a3=7ffd5cbae51c items=0 ppid=3208 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:16.765700 env[1212]: time="2025-05-10T00:46:16.765488576Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:16.765700 env[1212]: time="2025-05-10T00:46:16.765575362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:16.765700 env[1212]: time="2025-05-10T00:46:16.765612278Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:16.766181 env[1212]: time="2025-05-10T00:46:16.766107117Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701 pid=3469 runtime=io.containerd.runc.v2 May 10 00:46:16.782165 systemd[1]: Started cri-containerd-66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701.scope. May 10 00:46:16.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit: BPF prog-id=155 op=LOAD May 10 00:46:16.793000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.793000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=3469 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643434353266616336363064323062363863363938616636316465 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=c items=0 ppid=3469 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643434353266616336363064323062363863363938616636316465 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit: BPF prog-id=156 op=LOAD May 10 00:46:16.794000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c0002dde00 items=0 ppid=3469 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643434353266616336363064323062363863363938616636316465 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit: BPF prog-id=157 op=LOAD May 10 00:46:16.794000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c0002dde48 items=0 ppid=3469 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643434353266616336363064323062363863363938616636316465 May 10 00:46:16.794000 audit: BPF prog-id=157 op=UNLOAD May 10 00:46:16.794000 audit: BPF prog-id=156 op=UNLOAD May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.794000 audit: BPF prog-id=158 op=LOAD May 10 00:46:16.794000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0003c2258 items=0 ppid=3469 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643434353266616336363064323062363863363938616636316465 May 10 00:46:16.799133 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:16.804605 env[1212]: time="2025-05-10T00:46:16.804552159Z" level=info msg="StopPodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\"" May 10 00:46:16.822634 env[1212]: time="2025-05-10T00:46:16.822575339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7gfdm,Uid:0761c05f-1dfa-4ec9-8d64-61199e168290,Namespace:kube-system,Attempt:1,} returns sandbox id \"66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701\"" May 10 00:46:16.824451 kubelet[1950]: E0510 00:46:16.823785 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:16.826557 env[1212]: time="2025-05-10T00:46:16.826528934Z" level=info msg="CreateContainer within sandbox \"66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:46:16.850878 env[1212]: time="2025-05-10T00:46:16.850821882Z" level=info msg="CreateContainer within sandbox \"66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b57b7895b3e1aa814cad1edb2939232d10787e278c3ec5b47b433f50dde3a83f\"" May 10 00:46:16.851783 env[1212]: time="2025-05-10T00:46:16.851754217Z" level=info msg="StartContainer for \"b57b7895b3e1aa814cad1edb2939232d10787e278c3ec5b47b433f50dde3a83f\"" May 10 00:46:16.871456 systemd[1]: Started cri-containerd-b57b7895b3e1aa814cad1edb2939232d10787e278c3ec5b47b433f50dde3a83f.scope. May 10 00:46:16.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.890000 audit: BPF prog-id=159 op=LOAD May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3469 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235376237383935623365316161383134636164316564623239333932 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=3469 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235376237383935623365316161383134636164316564623239333932 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit: BPF prog-id=160 op=LOAD May 10 00:46:16.891000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000309370 items=0 ppid=3469 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235376237383935623365316161383134636164316564623239333932 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit: BPF prog-id=161 op=LOAD May 10 00:46:16.891000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0003093b8 items=0 ppid=3469 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235376237383935623365316161383134636164316564623239333932 May 10 00:46:16.891000 audit: BPF prog-id=161 op=UNLOAD May 10 00:46:16.891000 audit: BPF prog-id=160 op=UNLOAD May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:16.891000 audit: BPF prog-id=162 op=LOAD May 10 00:46:16.891000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003097c8 items=0 ppid=3469 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235376237383935623365316161383134636164316564623239333932 May 10 00:46:16.910595 env[1212]: time="2025-05-10T00:46:16.910535095Z" level=info msg="StartContainer for \"b57b7895b3e1aa814cad1edb2939232d10787e278c3ec5b47b433f50dde3a83f\" returns successfully" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.864 [INFO][3516] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.864 [INFO][3516] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" iface="eth0" netns="/var/run/netns/cni-1ddc8232-c950-472a-463c-58c0a1ceb960" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.864 [INFO][3516] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" iface="eth0" netns="/var/run/netns/cni-1ddc8232-c950-472a-463c-58c0a1ceb960" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.865 [INFO][3516] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" iface="eth0" netns="/var/run/netns/cni-1ddc8232-c950-472a-463c-58c0a1ceb960" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.865 [INFO][3516] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.865 [INFO][3516] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.905 [INFO][3545] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.905 [INFO][3545] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.905 [INFO][3545] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.913 [WARNING][3545] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.913 [INFO][3545] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.914 [INFO][3545] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:16.918218 env[1212]: 2025-05-10 00:46:16.916 [INFO][3516] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:16.918660 env[1212]: time="2025-05-10T00:46:16.918372440Z" level=info msg="TearDown network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" successfully" May 10 00:46:16.918660 env[1212]: time="2025-05-10T00:46:16.918414876Z" level=info msg="StopPodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" returns successfully" May 10 00:46:16.919180 env[1212]: time="2025-05-10T00:46:16.919143917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-qwlvl,Uid:5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b,Namespace:calico-apiserver,Attempt:1,}" May 10 00:46:17.289763 systemd-networkd[1022]: cali49ae88b6765: Link UP May 10 00:46:17.294925 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali49ae88b6765: link becomes ready May 10 00:46:17.295141 systemd-networkd[1022]: cali49ae88b6765: Gained carrier May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:16.986 [INFO][3568] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0 calico-apiserver-79df748467- calico-apiserver 5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b 913 0 2025-05-10 00:45:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79df748467 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-79df748467-qwlvl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali49ae88b6765 [] []}} ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:16.986 [INFO][3568] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.093 [INFO][3589] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" HandleID="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.102 [INFO][3589] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" HandleID="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050210), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-79df748467-qwlvl", "timestamp":"2025-05-10 00:46:17.093807156 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.102 [INFO][3589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.102 [INFO][3589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.102 [INFO][3589] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.104 [INFO][3589] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.109 [INFO][3589] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.113 [INFO][3589] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.116 [INFO][3589] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.118 [INFO][3589] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.118 [INFO][3589] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.120 [INFO][3589] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044 May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.186 [INFO][3589] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.285 [INFO][3589] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.285 [INFO][3589] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" host="localhost" May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.285 [INFO][3589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:17.308361 env[1212]: 2025-05-10 00:46:17.285 [INFO][3589] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" HandleID="k8s-pod-network.359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.309048 env[1212]: 2025-05-10 00:46:17.287 [INFO][3568] cni-plugin/k8s.go 386: Populated endpoint ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0", GenerateName:"calico-apiserver-79df748467-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79df748467", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-79df748467-qwlvl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali49ae88b6765", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:17.309048 env[1212]: 2025-05-10 00:46:17.287 [INFO][3568] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.309048 env[1212]: 2025-05-10 00:46:17.288 [INFO][3568] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali49ae88b6765 ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.309048 env[1212]: 2025-05-10 00:46:17.295 [INFO][3568] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.309048 env[1212]: 2025-05-10 00:46:17.295 [INFO][3568] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0", GenerateName:"calico-apiserver-79df748467-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79df748467", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044", Pod:"calico-apiserver-79df748467-qwlvl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali49ae88b6765", MAC:"0a:bc:1e:8f:29:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:17.309048 env[1212]: 2025-05-10 00:46:17.306 [INFO][3568] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-qwlvl" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:17.319000 audit[3611]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=3611 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:17.319000 audit[3611]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffc5f2460f0 a2=0 a3=7ffc5f2460dc items=0 ppid=3208 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:17.329311 env[1212]: time="2025-05-10T00:46:17.329173553Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:17.329311 env[1212]: time="2025-05-10T00:46:17.329230145Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:17.329311 env[1212]: time="2025-05-10T00:46:17.329240724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:17.329876 env[1212]: time="2025-05-10T00:46:17.329804280Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044 pid=3619 runtime=io.containerd.runc.v2 May 10 00:46:17.343387 systemd[1]: Started cri-containerd-359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044.scope. May 10 00:46:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.360000 audit: BPF prog-id=163 op=LOAD May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396533666637303465333634376462653239316131353030373233 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396533666637303465333634376462653239316131353030373233 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit: BPF prog-id=164 op=LOAD May 10 00:46:17.361000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000308f80 items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396533666637303465333634376462653239316131353030373233 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit: BPF prog-id=165 op=LOAD May 10 00:46:17.361000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000308fc8 items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396533666637303465333634376462653239316131353030373233 May 10 00:46:17.361000 audit: BPF prog-id=165 op=UNLOAD May 10 00:46:17.361000 audit: BPF prog-id=164 op=UNLOAD May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:17.361000 audit: BPF prog-id=166 op=LOAD May 10 00:46:17.361000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003093d8 items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396533666637303465333634376462653239316131353030373233 May 10 00:46:17.363161 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:17.397182 env[1212]: time="2025-05-10T00:46:17.397117513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-qwlvl,Uid:5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044\"" May 10 00:46:17.398799 env[1212]: time="2025-05-10T00:46:17.398768259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:46:17.503083 kubelet[1950]: E0510 00:46:17.502988 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:17.518021 systemd[1]: run-containerd-runc-k8s.io-66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701-runc.QxdwxH.mount: Deactivated successfully. May 10 00:46:17.518135 systemd[1]: run-netns-cni\x2d1ddc8232\x2dc950\x2d472a\x2d463c\x2d58c0a1ceb960.mount: Deactivated successfully. May 10 00:46:17.581113 kubelet[1950]: I0510 00:46:17.580220 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-7gfdm" podStartSLOduration=53.580187868 podStartE2EDuration="53.580187868s" podCreationTimestamp="2025-05-10 00:45:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:17.517080346 +0000 UTC m=+58.841250934" watchObservedRunningTime="2025-05-10 00:46:17.580187868 +0000 UTC m=+58.904358476" May 10 00:46:17.675000 audit[3658]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=3658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.675000 audit[3658]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb02c78e0 a2=0 a3=7ffcb02c78cc items=0 ppid=2065 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.680000 audit[3658]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.680000 audit[3658]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb02c78e0 a2=0 a3=0 items=0 ppid=2065 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.695000 audit[3660]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.695000 audit[3660]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcaa869270 a2=0 a3=7ffcaa86925c items=0 ppid=2065 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.695000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:17.701000 audit[3660]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=3660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:17.701000 audit[3660]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcaa869270 a2=0 a3=7ffcaa86925c items=0 ppid=2065 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:17.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:18.075973 systemd-networkd[1022]: calic13b8081bb7: Gained IPv6LL May 10 00:46:18.076299 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL May 10 00:46:18.192000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:18.192000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ca5e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:46:18.192000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:18.198000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:18.198000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005e51e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:46:18.198000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:18.200000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:18.200000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bf15e0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:46:18.200000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:18.201000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:18.201000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005e54a0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:46:18.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:18.506529 kubelet[1950]: E0510 00:46:18.506494 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:18.796141 env[1212]: time="2025-05-10T00:46:18.796000074Z" level=info msg="StopPodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\"" May 10 00:46:18.803881 env[1212]: time="2025-05-10T00:46:18.802780393Z" level=info msg="StopPodSandbox for \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\"" May 10 00:46:18.803881 env[1212]: time="2025-05-10T00:46:18.803099841Z" level=info msg="StopPodSandbox for \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\"" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:18.940 [WARNING][3685] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0", GenerateName:"calico-apiserver-79df748467-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79df748467", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044", Pod:"calico-apiserver-79df748467-qwlvl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali49ae88b6765", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:18.941 [INFO][3685] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:18.941 [INFO][3685] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" iface="eth0" netns="" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:18.941 [INFO][3685] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:18.941 [INFO][3685] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.068 [INFO][3737] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.068 [INFO][3737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.068 [INFO][3737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.112 [WARNING][3737] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.112 [INFO][3737] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.114 [INFO][3737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:19.118822 env[1212]: 2025-05-10 00:46:19.117 [INFO][3685] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.118822 env[1212]: time="2025-05-10T00:46:19.118751729Z" level=info msg="TearDown network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" successfully" May 10 00:46:19.118822 env[1212]: time="2025-05-10T00:46:19.118787574Z" level=info msg="StopPodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" returns successfully" May 10 00:46:19.119540 env[1212]: time="2025-05-10T00:46:19.119451959Z" level=info msg="RemovePodSandbox for \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\"" May 10 00:46:19.119704 env[1212]: time="2025-05-10T00:46:19.119482223Z" level=info msg="Forcibly stopping sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\"" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.041 [INFO][3718] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.041 [INFO][3718] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" iface="eth0" netns="/var/run/netns/cni-cbcd0db8-1857-7289-e75a-f0d489732632" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.041 [INFO][3718] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" iface="eth0" netns="/var/run/netns/cni-cbcd0db8-1857-7289-e75a-f0d489732632" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.041 [INFO][3718] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" iface="eth0" netns="/var/run/netns/cni-cbcd0db8-1857-7289-e75a-f0d489732632" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.041 [INFO][3718] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.041 [INFO][3718] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.074 [INFO][3743] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" HandleID="k8s-pod-network.e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" Workload="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.074 [INFO][3743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.115 [INFO][3743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.121 [WARNING][3743] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" HandleID="k8s-pod-network.e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" Workload="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.121 [INFO][3743] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" HandleID="k8s-pod-network.e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" Workload="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.122 [INFO][3743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:19.125523 env[1212]: 2025-05-10 00:46:19.124 [INFO][3718] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08" May 10 00:46:19.126230 env[1212]: time="2025-05-10T00:46:19.125748816Z" level=info msg="TearDown network for sandbox \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\" successfully" May 10 00:46:19.126230 env[1212]: time="2025-05-10T00:46:19.125795972Z" level=info msg="StopPodSandbox for \"e0ab5d616bbce6bcbe63d1f80b897de3297adfc363266c53e33630b563fd1c08\" returns successfully" May 10 00:46:19.128262 systemd[1]: run-netns-cni\x2dcbcd0db8\x2d1857\x2d7289\x2de75a\x2df0d489732632.mount: Deactivated successfully. May 10 00:46:19.130042 env[1212]: time="2025-05-10T00:46:19.130007849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-tz56m,Uid:96bd9235-8ff6-4dae-b311-5624acc3e965,Namespace:calico-apiserver,Attempt:1,}" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.112 [INFO][3723] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.112 [INFO][3723] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" iface="eth0" netns="/var/run/netns/cni-b9a3b5c3-2a2a-32a6-b1f1-5b4dd6eede28" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.112 [INFO][3723] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" iface="eth0" netns="/var/run/netns/cni-b9a3b5c3-2a2a-32a6-b1f1-5b4dd6eede28" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.112 [INFO][3723] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" iface="eth0" netns="/var/run/netns/cni-b9a3b5c3-2a2a-32a6-b1f1-5b4dd6eede28" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.112 [INFO][3723] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.112 [INFO][3723] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.143 [INFO][3754] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" HandleID="k8s-pod-network.06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" Workload="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.143 [INFO][3754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.143 [INFO][3754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.149 [WARNING][3754] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" HandleID="k8s-pod-network.06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" Workload="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.149 [INFO][3754] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" HandleID="k8s-pod-network.06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" Workload="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.151 [INFO][3754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:19.155683 env[1212]: 2025-05-10 00:46:19.153 [INFO][3723] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa" May 10 00:46:19.158989 systemd[1]: run-netns-cni\x2db9a3b5c3\x2d2a2a\x2d32a6\x2db1f1\x2d5b4dd6eede28.mount: Deactivated successfully. May 10 00:46:19.160670 env[1212]: time="2025-05-10T00:46:19.160621306Z" level=info msg="TearDown network for sandbox \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\" successfully" May 10 00:46:19.160762 env[1212]: time="2025-05-10T00:46:19.160670055Z" level=info msg="StopPodSandbox for \"06737607e7aa4844b33dd67d8a421324d4f3c283f2aeab9ef9e7aa6568e56afa\" returns successfully" May 10 00:46:19.161553 env[1212]: time="2025-05-10T00:46:19.161520617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gb6dh,Uid:88369301-e94b-4f26-89a8-6639d6b6ee8d,Namespace:calico-system,Attempt:1,}" May 10 00:46:19.163832 systemd-networkd[1022]: cali49ae88b6765: Gained IPv6LL May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.186 [WARNING][3780] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0", GenerateName:"calico-apiserver-79df748467-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d47e5e0-b6ad-4c3b-8d0e-0ffab6da847b", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79df748467", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044", Pod:"calico-apiserver-79df748467-qwlvl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali49ae88b6765", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.186 [INFO][3780] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.186 [INFO][3780] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" iface="eth0" netns="" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.186 [INFO][3780] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.186 [INFO][3780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.211 [INFO][3789] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.211 [INFO][3789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.211 [INFO][3789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.255 [WARNING][3789] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.255 [INFO][3789] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" HandleID="k8s-pod-network.46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" Workload="localhost-k8s-calico--apiserver--79df748467--qwlvl-eth0" May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.257 [INFO][3789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:19.259768 env[1212]: 2025-05-10 00:46:19.258 [INFO][3780] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73" May 10 00:46:19.260259 env[1212]: time="2025-05-10T00:46:19.259810045Z" level=info msg="TearDown network for sandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" successfully" May 10 00:46:19.507826 kubelet[1950]: E0510 00:46:19.507794 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:19.961765 env[1212]: time="2025-05-10T00:46:19.961551502Z" level=info msg="RemovePodSandbox \"46430b88470e7000435e9237c649ec68e037646376a7ad00668f7bf1c87b0f73\" returns successfully" May 10 00:46:19.962396 env[1212]: time="2025-05-10T00:46:19.962351893Z" level=info msg="StopPodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\"" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.002 [WARNING][3812] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0761c05f-1dfa-4ec9-8d64-61199e168290", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701", Pod:"coredns-6f6b679f8f-7gfdm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic13b8081bb7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.002 [INFO][3812] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.002 [INFO][3812] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" iface="eth0" netns="" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.002 [INFO][3812] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.002 [INFO][3812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.030 [INFO][3820] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.030 [INFO][3820] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.030 [INFO][3820] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.037 [WARNING][3820] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.037 [INFO][3820] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.039 [INFO][3820] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:20.042135 env[1212]: 2025-05-10 00:46:20.040 [INFO][3812] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.042819 env[1212]: time="2025-05-10T00:46:20.042181788Z" level=info msg="TearDown network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" successfully" May 10 00:46:20.042819 env[1212]: time="2025-05-10T00:46:20.042235155Z" level=info msg="StopPodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" returns successfully" May 10 00:46:20.042887 env[1212]: time="2025-05-10T00:46:20.042853138Z" level=info msg="RemovePodSandbox for \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\"" May 10 00:46:20.042923 env[1212]: time="2025-05-10T00:46:20.042886840Z" level=info msg="Forcibly stopping sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\"" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.096 [WARNING][3842] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0761c05f-1dfa-4ec9-8d64-61199e168290", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"66d4452fac660d20b68c698af61dec3fbd0a4bc4dbe246bd888fc55374c9d701", Pod:"coredns-6f6b679f8f-7gfdm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic13b8081bb7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.096 [INFO][3842] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.096 [INFO][3842] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" iface="eth0" netns="" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.096 [INFO][3842] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.096 [INFO][3842] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.138 [INFO][3851] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.138 [INFO][3851] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.138 [INFO][3851] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.146 [WARNING][3851] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.146 [INFO][3851] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" HandleID="k8s-pod-network.c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" Workload="localhost-k8s-coredns--6f6b679f8f--7gfdm-eth0" May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.148 [INFO][3851] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:20.151734 env[1212]: 2025-05-10 00:46:20.150 [INFO][3842] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4" May 10 00:46:20.152341 env[1212]: time="2025-05-10T00:46:20.151757210Z" level=info msg="TearDown network for sandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" successfully" May 10 00:46:20.391231 env[1212]: time="2025-05-10T00:46:20.391161147Z" level=info msg="RemovePodSandbox \"c4c11cdca776f179e78de7822d3aee49d5f945555aef263bdd74fdfcc90713b4\" returns successfully" May 10 00:46:20.578563 systemd-networkd[1022]: calicedd36a3ff0: Link UP May 10 00:46:20.594773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:20.594941 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicedd36a3ff0: link becomes ready May 10 00:46:20.595535 systemd-networkd[1022]: calicedd36a3ff0: Gained carrier May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.430 [INFO][3859] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--79df748467--tz56m-eth0 calico-apiserver-79df748467- calico-apiserver 96bd9235-8ff6-4dae-b311-5624acc3e965 940 0 2025-05-10 00:45:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79df748467 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-79df748467-tz56m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicedd36a3ff0 [] []}} ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.430 [INFO][3859] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.469 [INFO][3886] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" HandleID="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Workload="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.479 [INFO][3886] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" HandleID="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Workload="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000295630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-79df748467-tz56m", "timestamp":"2025-05-10 00:46:20.469912094 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.479 [INFO][3886] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.479 [INFO][3886] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.479 [INFO][3886] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.481 [INFO][3886] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.487 [INFO][3886] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.492 [INFO][3886] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.494 [INFO][3886] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.496 [INFO][3886] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.496 [INFO][3886] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.497 [INFO][3886] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47 May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.548 [INFO][3886] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.571 [INFO][3886] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.571 [INFO][3886] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" host="localhost" May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.571 [INFO][3886] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:20.710701 env[1212]: 2025-05-10 00:46:20.571 [INFO][3886] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" HandleID="k8s-pod-network.d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Workload="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.711462 env[1212]: 2025-05-10 00:46:20.574 [INFO][3859] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--79df748467--tz56m-eth0", GenerateName:"calico-apiserver-79df748467-", Namespace:"calico-apiserver", SelfLink:"", UID:"96bd9235-8ff6-4dae-b311-5624acc3e965", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79df748467", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-79df748467-tz56m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicedd36a3ff0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:20.711462 env[1212]: 2025-05-10 00:46:20.574 [INFO][3859] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.711462 env[1212]: 2025-05-10 00:46:20.574 [INFO][3859] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicedd36a3ff0 ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.711462 env[1212]: 2025-05-10 00:46:20.595 [INFO][3859] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.711462 env[1212]: 2025-05-10 00:46:20.596 [INFO][3859] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--79df748467--tz56m-eth0", GenerateName:"calico-apiserver-79df748467-", Namespace:"calico-apiserver", SelfLink:"", UID:"96bd9235-8ff6-4dae-b311-5624acc3e965", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79df748467", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47", Pod:"calico-apiserver-79df748467-tz56m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicedd36a3ff0", MAC:"ba:ec:f1:1c:7b:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:20.711462 env[1212]: 2025-05-10 00:46:20.708 [INFO][3859] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47" Namespace="calico-apiserver" Pod="calico-apiserver-79df748467-tz56m" WorkloadEndpoint="localhost-k8s-calico--apiserver--79df748467--tz56m-eth0" May 10 00:46:20.721000 audit[3921]: NETFILTER_CFG table=filter:111 family=2 entries=44 op=nft_register_chain pid=3921 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:20.721000 audit[3921]: SYSCALL arch=c000003e syscall=46 success=yes exit=24368 a0=3 a1=7fff0e743910 a2=0 a3=7fff0e7438fc items=0 ppid=3208 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.721000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:20.801968 env[1212]: time="2025-05-10T00:46:20.801922631Z" level=info msg="StopPodSandbox for \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\"" May 10 00:46:20.802381 env[1212]: time="2025-05-10T00:46:20.802345769Z" level=info msg="StopPodSandbox for \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\"" May 10 00:46:20.909808 env[1212]: time="2025-05-10T00:46:20.909217836Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:20.909808 env[1212]: time="2025-05-10T00:46:20.909268318Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:20.909808 env[1212]: time="2025-05-10T00:46:20.909296609Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:20.909808 env[1212]: time="2025-05-10T00:46:20.909579905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47 pid=3979 runtime=io.containerd.runc.v2 May 10 00:46:20.922912 systemd-networkd[1022]: calia70e7d02e8a: Link UP May 10 00:46:20.925083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia70e7d02e8a: link becomes ready May 10 00:46:20.924850 systemd-networkd[1022]: calia70e7d02e8a: Gained carrier May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.449 [INFO][3870] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--gb6dh-eth0 csi-node-driver- calico-system 88369301-e94b-4f26-89a8-6639d6b6ee8d 941 0 2025-05-10 00:45:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-gb6dh eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia70e7d02e8a [] []}} ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.449 [INFO][3870] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.485 [INFO][3894] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" HandleID="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Workload="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.492 [INFO][3894] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" HandleID="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Workload="localhost-k8s-csi--node--driver--gb6dh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000366bb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-gb6dh", "timestamp":"2025-05-10 00:46:20.485303328 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.492 [INFO][3894] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.573 [INFO][3894] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.573 [INFO][3894] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.582 [INFO][3894] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.708 [INFO][3894] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.787 [INFO][3894] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.789 [INFO][3894] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.792 [INFO][3894] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.792 [INFO][3894] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.868 [INFO][3894] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880 May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.891 [INFO][3894] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.899 [INFO][3894] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.899 [INFO][3894] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" host="localhost" May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.899 [INFO][3894] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:20.938299 env[1212]: 2025-05-10 00:46:20.899 [INFO][3894] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" HandleID="k8s-pod-network.8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Workload="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.938918 env[1212]: 2025-05-10 00:46:20.914 [INFO][3870] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gb6dh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88369301-e94b-4f26-89a8-6639d6b6ee8d", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-gb6dh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia70e7d02e8a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:20.938918 env[1212]: 2025-05-10 00:46:20.914 [INFO][3870] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.938918 env[1212]: 2025-05-10 00:46:20.914 [INFO][3870] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia70e7d02e8a ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.938918 env[1212]: 2025-05-10 00:46:20.924 [INFO][3870] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.938918 env[1212]: 2025-05-10 00:46:20.925 [INFO][3870] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gb6dh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88369301-e94b-4f26-89a8-6639d6b6ee8d", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880", Pod:"csi-node-driver-gb6dh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia70e7d02e8a", MAC:"2a:20:cc:08:1e:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:20.938918 env[1212]: 2025-05-10 00:46:20.936 [INFO][3870] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880" Namespace="calico-system" Pod="csi-node-driver-gb6dh" WorkloadEndpoint="localhost-k8s-csi--node--driver--gb6dh-eth0" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.918 [INFO][3958] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.918 [INFO][3958] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" iface="eth0" netns="/var/run/netns/cni-1813ad7e-e9c9-aad9-d987-d6d889c3dad1" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.918 [INFO][3958] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" iface="eth0" netns="/var/run/netns/cni-1813ad7e-e9c9-aad9-d987-d6d889c3dad1" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.918 [INFO][3958] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" iface="eth0" netns="/var/run/netns/cni-1813ad7e-e9c9-aad9-d987-d6d889c3dad1" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.918 [INFO][3958] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.918 [INFO][3958] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.950 [INFO][3995] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" HandleID="k8s-pod-network.5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" Workload="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.950 [INFO][3995] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.951 [INFO][3995] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.958 [WARNING][3995] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" HandleID="k8s-pod-network.5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" Workload="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.958 [INFO][3995] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" HandleID="k8s-pod-network.5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" Workload="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.960 [INFO][3995] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:20.965075 env[1212]: 2025-05-10 00:46:20.962 [INFO][3958] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5" May 10 00:46:20.966039 env[1212]: time="2025-05-10T00:46:20.965226732Z" level=info msg="TearDown network for sandbox \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\" successfully" May 10 00:46:20.966039 env[1212]: time="2025-05-10T00:46:20.965260894Z" level=info msg="StopPodSandbox for \"5999dd2ea75e5c06baa935b4a9d6b304007723dfa089efb2ebe4a00eb9b3fdf5\" returns successfully" May 10 00:46:20.966039 env[1212]: time="2025-05-10T00:46:20.965989138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-576db6cf6d-x79r6,Uid:9bc956eb-35da-45b8-a7e6-fc3120daf6b5,Namespace:calico-system,Attempt:1,}" May 10 00:46:20.970651 systemd[1]: Started cri-containerd-d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47.scope. May 10 00:46:20.973000 audit[4038]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:20.976349 kernel: kauditd_printk_skb: 722 callbacks suppressed May 10 00:46:20.976410 kernel: audit: type=1325 audit(1746837980.973:1198): table=filter:112 family=2 entries=42 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:20.973000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=21508 a0=3 a1=7ffe69979070 a2=0 a3=7ffe6997905c items=0 ppid=3208 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.985034 kernel: audit: type=1300 audit(1746837980.973:1198): arch=c000003e syscall=46 success=yes exit=21508 a0=3 a1=7ffe69979070 a2=0 a3=7ffe6997905c items=0 ppid=3208 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.989197 kernel: audit: type=1327 audit(1746837980.973:1198): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:20.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:20.989339 env[1212]: time="2025-05-10T00:46:20.983510065Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:20.989339 env[1212]: time="2025-05-10T00:46:20.988564235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:20.989339 env[1212]: time="2025-05-10T00:46:20.988606441Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:20.989339 env[1212]: time="2025-05-10T00:46:20.988848401Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880 pid=4042 runtime=io.containerd.runc.v2 May 10 00:46:21.001033 kernel: audit: type=1400 audit(1746837980.991:1199): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.001357 kernel: audit: type=1400 audit(1746837980.991:1200): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.001531 kernel: audit: type=1400 audit(1746837980.991:1201): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.905 [INFO][3959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.905 [INFO][3959] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" iface="eth0" netns="/var/run/netns/cni-5431a5b0-fd0d-63fc-1e7b-f6db776cd8e5" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.906 [INFO][3959] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" iface="eth0" netns="/var/run/netns/cni-5431a5b0-fd0d-63fc-1e7b-f6db776cd8e5" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.908 [INFO][3959] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" iface="eth0" netns="/var/run/netns/cni-5431a5b0-fd0d-63fc-1e7b-f6db776cd8e5" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.908 [INFO][3959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.908 [INFO][3959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.980 [INFO][3991] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" HandleID="k8s-pod-network.25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" Workload="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.980 [INFO][3991] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.980 [INFO][3991] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.986 [WARNING][3991] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" HandleID="k8s-pod-network.25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" Workload="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.986 [INFO][3991] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" HandleID="k8s-pod-network.25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" Workload="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.988 [INFO][3991] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:21.001981 env[1212]: 2025-05-10 00:46:20.990 [INFO][3959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0" May 10 00:46:21.001981 env[1212]: time="2025-05-10T00:46:20.992872018Z" level=info msg="TearDown network for sandbox \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\" successfully" May 10 00:46:21.001981 env[1212]: time="2025-05-10T00:46:20.992917440Z" level=info msg="StopPodSandbox for \"25a920e0435e5355ccf2b905e03637555b3b0fe5cd0a4568789cb98fba126aa0\" returns successfully" May 10 00:46:21.001981 env[1212]: time="2025-05-10T00:46:20.998062475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7qqv8,Uid:201db9ab-42d0-46b1-8074-10f854042d80,Namespace:kube-system,Attempt:1,}" May 10 00:46:21.002567 kubelet[1950]: E0510 00:46:20.993312 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.008675 kernel: audit: type=1400 audit(1746837980.991:1202): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.016772 kernel: audit: type=1400 audit(1746837980.991:1203): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.016883 kernel: audit: type=1400 audit(1746837980.991:1204): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.017047 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.021818 kernel: audit: type=1400 audit(1746837980.991:1205): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:20.998000 audit: BPF prog-id=167 op=LOAD May 10 00:46:21.000000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643032376131623439356635363931386564633632613131643838 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643032376131623439356635363931386564633632613131643838 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.000000 audit: BPF prog-id=168 op=LOAD May 10 00:46:21.000000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00030c4e0 items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643032376131623439356635363931386564633632613131643838 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit: BPF prog-id=169 op=LOAD May 10 00:46:21.002000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00030c528 items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643032376131623439356635363931386564633632613131643838 May 10 00:46:21.002000 audit: BPF prog-id=169 op=UNLOAD May 10 00:46:21.002000 audit: BPF prog-id=168 op=UNLOAD May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.002000 audit: BPF prog-id=170 op=LOAD May 10 00:46:21.002000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030c938 items=0 ppid=3979 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643032376131623439356635363931386564633632613131643838 May 10 00:46:21.044637 systemd[1]: Started cri-containerd-8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880.scope. May 10 00:46:21.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit: BPF prog-id=171 op=LOAD May 10 00:46:21.057000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4042 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386438376464633261643461663766353035636332646664366238 May 10 00:46:21.057000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.057000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4042 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386438376464633261643461663766353035636332646664366238 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit: BPF prog-id=172 op=LOAD May 10 00:46:21.058000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000289040 items=0 ppid=4042 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386438376464633261643461663766353035636332646664366238 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit: BPF prog-id=173 op=LOAD May 10 00:46:21.058000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000289088 items=0 ppid=4042 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386438376464633261643461663766353035636332646664366238 May 10 00:46:21.058000 audit: BPF prog-id=173 op=UNLOAD May 10 00:46:21.058000 audit: BPF prog-id=172 op=UNLOAD May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.058000 audit: BPF prog-id=174 op=LOAD May 10 00:46:21.058000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000289498 items=0 ppid=4042 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386438376464633261643461663766353035636332646664366238 May 10 00:46:21.060947 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:21.088302 env[1212]: time="2025-05-10T00:46:21.088237964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gb6dh,Uid:88369301-e94b-4f26-89a8-6639d6b6ee8d,Namespace:calico-system,Attempt:1,} returns sandbox id \"8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880\"" May 10 00:46:21.088527 env[1212]: time="2025-05-10T00:46:21.088239136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79df748467-tz56m,Uid:96bd9235-8ff6-4dae-b311-5624acc3e965,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47\"" May 10 00:46:21.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.116:22-10.0.0.1:55594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:21.261969 systemd[1]: Started sshd@10-10.0.0.116:22-10.0.0.1:55594.service. May 10 00:46:21.300822 systemd[1]: run-netns-cni\x2d5431a5b0\x2dfd0d\x2d63fc\x2d1e7b\x2df6db776cd8e5.mount: Deactivated successfully. May 10 00:46:21.300901 systemd[1]: run-netns-cni\x2d1813ad7e\x2de9c9\x2daad9\x2dd987\x2dd6d889c3dad1.mount: Deactivated successfully. May 10 00:46:21.313000 audit[4130]: USER_ACCT pid=4130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:21.315001 sshd[4130]: Accepted publickey for core from 10.0.0.1 port 55594 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:21.314000 audit[4130]: CRED_ACQ pid=4130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:21.314000 audit[4130]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff0de80f0 a2=3 a3=0 items=0 ppid=1 pid=4130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:21.316650 sshd[4130]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:21.322160 systemd-logind[1200]: New session 11 of user core. May 10 00:46:21.323195 systemd[1]: Started session-11.scope. May 10 00:46:21.325000 audit[4130]: USER_START pid=4130 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:21.327000 audit[4133]: CRED_ACQ pid=4133 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:21.461514 systemd-networkd[1022]: calib7242321d64: Link UP May 10 00:46:21.466792 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib7242321d64: link becomes ready May 10 00:46:21.466708 systemd-networkd[1022]: calib7242321d64: Gained carrier May 10 00:46:21.469127 sshd[4130]: pam_unix(sshd:session): session closed for user core May 10 00:46:21.474000 audit[4130]: USER_END pid=4130 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:21.474000 audit[4130]: CRED_DISP pid=4130 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:21.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.116:22-10.0.0.1:55594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:21.477979 systemd[1]: sshd@10-10.0.0.116:22-10.0.0.1:55594.service: Deactivated successfully. May 10 00:46:21.478903 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:46:21.482507 systemd-logind[1200]: Session 11 logged out. Waiting for processes to exit. May 10 00:46:21.483646 systemd-logind[1200]: Removed session 11. May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.231 [INFO][4073] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0 coredns-6f6b679f8f- kube-system 201db9ab-42d0-46b1-8074-10f854042d80 955 0 2025-05-10 00:45:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-7qqv8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib7242321d64 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.231 [INFO][4073] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.263 [INFO][4114] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" HandleID="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Workload="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.275 [INFO][4114] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" HandleID="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Workload="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000394400), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-7qqv8", "timestamp":"2025-05-10 00:46:21.263699805 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.275 [INFO][4114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.275 [INFO][4114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.275 [INFO][4114] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.277 [INFO][4114] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.281 [INFO][4114] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.287 [INFO][4114] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.294 [INFO][4114] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.298 [INFO][4114] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.298 [INFO][4114] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.316 [INFO][4114] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113 May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.336 [INFO][4114] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.455 [INFO][4114] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.455 [INFO][4114] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" host="localhost" May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.455 [INFO][4114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:21.486282 env[1212]: 2025-05-10 00:46:21.455 [INFO][4114] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" HandleID="k8s-pod-network.3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Workload="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.487229 env[1212]: 2025-05-10 00:46:21.458 [INFO][4073] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"201db9ab-42d0-46b1-8074-10f854042d80", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-7qqv8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib7242321d64", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:21.487229 env[1212]: 2025-05-10 00:46:21.458 [INFO][4073] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.487229 env[1212]: 2025-05-10 00:46:21.458 [INFO][4073] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib7242321d64 ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.487229 env[1212]: 2025-05-10 00:46:21.468 [INFO][4073] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.487229 env[1212]: 2025-05-10 00:46:21.468 [INFO][4073] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"201db9ab-42d0-46b1-8074-10f854042d80", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113", Pod:"coredns-6f6b679f8f-7qqv8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib7242321d64", MAC:"d6:33:81:46:10:af", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:21.487229 env[1212]: 2025-05-10 00:46:21.483 [INFO][4073] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113" Namespace="kube-system" Pod="coredns-6f6b679f8f-7qqv8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--7qqv8-eth0" May 10 00:46:21.492000 audit[4154]: NETFILTER_CFG table=filter:113 family=2 entries=38 op=nft_register_chain pid=4154 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:21.492000 audit[4154]: SYSCALL arch=c000003e syscall=46 success=yes exit=19392 a0=3 a1=7fff16fe6070 a2=0 a3=7fff16fe605c items=0 ppid=3208 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.492000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:21.600629 env[1212]: time="2025-05-10T00:46:21.600488447Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:21.600629 env[1212]: time="2025-05-10T00:46:21.600525675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:21.600852 env[1212]: time="2025-05-10T00:46:21.600535413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:21.601000 env[1212]: time="2025-05-10T00:46:21.600962601Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113 pid=4168 runtime=io.containerd.runc.v2 May 10 00:46:21.610795 systemd-networkd[1022]: cali51abc8de48c: Link UP May 10 00:46:21.613629 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:21.613761 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali51abc8de48c: link becomes ready May 10 00:46:21.613990 systemd-networkd[1022]: cali51abc8de48c: Gained carrier May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.232 [INFO][4055] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0 calico-kube-controllers-576db6cf6d- calico-system 9bc956eb-35da-45b8-a7e6-fc3120daf6b5 957 0 2025-05-10 00:45:38 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:576db6cf6d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-576db6cf6d-x79r6 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali51abc8de48c [] []}} ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.232 [INFO][4055] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.285 [INFO][4120] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" HandleID="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Workload="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.298 [INFO][4120] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" HandleID="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Workload="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00036c910), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-576db6cf6d-x79r6", "timestamp":"2025-05-10 00:46:21.284635211 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.298 [INFO][4120] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.474 [INFO][4120] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.475 [INFO][4120] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.485 [INFO][4120] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.490 [INFO][4120] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.495 [INFO][4120] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.497 [INFO][4120] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.499 [INFO][4120] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.499 [INFO][4120] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.500 [INFO][4120] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808 May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.597 [INFO][4120] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.606 [INFO][4120] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.606 [INFO][4120] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" host="localhost" May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.606 [INFO][4120] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:21.629893 env[1212]: 2025-05-10 00:46:21.606 [INFO][4120] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" HandleID="k8s-pod-network.0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Workload="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.630841 env[1212]: 2025-05-10 00:46:21.608 [INFO][4055] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0", GenerateName:"calico-kube-controllers-576db6cf6d-", Namespace:"calico-system", SelfLink:"", UID:"9bc956eb-35da-45b8-a7e6-fc3120daf6b5", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"576db6cf6d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-576db6cf6d-x79r6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali51abc8de48c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:21.630841 env[1212]: 2025-05-10 00:46:21.608 [INFO][4055] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.630841 env[1212]: 2025-05-10 00:46:21.608 [INFO][4055] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali51abc8de48c ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.630841 env[1212]: 2025-05-10 00:46:21.614 [INFO][4055] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.630841 env[1212]: 2025-05-10 00:46:21.614 [INFO][4055] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0", GenerateName:"calico-kube-controllers-576db6cf6d-", Namespace:"calico-system", SelfLink:"", UID:"9bc956eb-35da-45b8-a7e6-fc3120daf6b5", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"576db6cf6d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808", Pod:"calico-kube-controllers-576db6cf6d-x79r6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali51abc8de48c", MAC:"d2:5f:50:f6:3f:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:21.630841 env[1212]: 2025-05-10 00:46:21.626 [INFO][4055] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808" Namespace="calico-system" Pod="calico-kube-controllers-576db6cf6d-x79r6" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--576db6cf6d--x79r6-eth0" May 10 00:46:21.642000 audit[4194]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:21.642000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffc696a7a40 a2=0 a3=7ffc696a7a2c items=0 ppid=3208 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.642000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:21.646744 systemd[1]: Started cri-containerd-3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113.scope. May 10 00:46:21.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.659000 audit: BPF prog-id=175 op=LOAD May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4168 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663634616136323033396364643535613332326139323330333464 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4168 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663634616136323033396364643535613332326139323330333464 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit: BPF prog-id=176 op=LOAD May 10 00:46:21.660000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000215290 items=0 ppid=4168 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663634616136323033396364643535613332326139323330333464 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit: BPF prog-id=177 op=LOAD May 10 00:46:21.660000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002152d8 items=0 ppid=4168 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663634616136323033396364643535613332326139323330333464 May 10 00:46:21.660000 audit: BPF prog-id=177 op=UNLOAD May 10 00:46:21.660000 audit: BPF prog-id=176 op=UNLOAD May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.660000 audit: BPF prog-id=178 op=LOAD May 10 00:46:21.660000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002156e8 items=0 ppid=4168 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663634616136323033396364643535613332326139323330333464 May 10 00:46:21.662928 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:21.667153 env[1212]: time="2025-05-10T00:46:21.667045075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:21.667153 env[1212]: time="2025-05-10T00:46:21.667120191Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:21.667153 env[1212]: time="2025-05-10T00:46:21.667152180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:21.667567 env[1212]: time="2025-05-10T00:46:21.667515983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808 pid=4215 runtime=io.containerd.runc.v2 May 10 00:46:21.689426 systemd[1]: Started cri-containerd-0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808.scope. May 10 00:46:21.704167 env[1212]: time="2025-05-10T00:46:21.704109386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-7qqv8,Uid:201db9ab-42d0-46b1-8074-10f854042d80,Namespace:kube-system,Attempt:1,} returns sandbox id \"3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113\"" May 10 00:46:21.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.702000 audit: BPF prog-id=179 op=LOAD May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4215 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376634613866356533666166643165343531353736646362626336 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=4215 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376634613866356533666166643165343531353736646362626336 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit: BPF prog-id=180 op=LOAD May 10 00:46:21.703000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003e8ce0 items=0 ppid=4215 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376634613866356533666166643165343531353736646362626336 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit: BPF prog-id=181 op=LOAD May 10 00:46:21.703000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0003e8d28 items=0 ppid=4215 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376634613866356533666166643165343531353736646362626336 May 10 00:46:21.703000 audit: BPF prog-id=181 op=UNLOAD May 10 00:46:21.703000 audit: BPF prog-id=180 op=UNLOAD May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.703000 audit: BPF prog-id=182 op=LOAD May 10 00:46:21.703000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003e9138 items=0 ppid=4215 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376634613866356533666166643165343531353736646362626336 May 10 00:46:21.708137 kubelet[1950]: E0510 00:46:21.707484 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:21.709923 env[1212]: time="2025-05-10T00:46:21.709883152Z" level=info msg="CreateContainer within sandbox \"3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:46:21.713100 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:46:21.739436 env[1212]: time="2025-05-10T00:46:21.739371632Z" level=info msg="CreateContainer within sandbox \"3ef64aa62039cdd55a322a923034dbb406b184ef184baa86cee1a34ff5d52113\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"59d7e6f4ccadac615e0d3128f6335467cab8808ac32be3c0ad9e686a54bf1bb4\"" May 10 00:46:21.740382 env[1212]: time="2025-05-10T00:46:21.740327895Z" level=info msg="StartContainer for \"59d7e6f4ccadac615e0d3128f6335467cab8808ac32be3c0ad9e686a54bf1bb4\"" May 10 00:46:21.749195 env[1212]: time="2025-05-10T00:46:21.749090030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-576db6cf6d-x79r6,Uid:9bc956eb-35da-45b8-a7e6-fc3120daf6b5,Namespace:calico-system,Attempt:1,} returns sandbox id \"0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808\"" May 10 00:46:21.771806 systemd[1]: Started cri-containerd-59d7e6f4ccadac615e0d3128f6335467cab8808ac32be3c0ad9e686a54bf1bb4.scope. May 10 00:46:21.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit: BPF prog-id=183 op=LOAD May 10 00:46:21.782000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4168 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539643765366634636361646163363135653064333132386636333335 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4168 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539643765366634636361646163363135653064333132386636333335 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.782000 audit: BPF prog-id=184 op=LOAD May 10 00:46:21.782000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020b670 items=0 ppid=4168 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539643765366634636361646163363135653064333132386636333335 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit: BPF prog-id=185 op=LOAD May 10 00:46:21.783000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020b6b8 items=0 ppid=4168 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539643765366634636361646163363135653064333132386636333335 May 10 00:46:21.783000 audit: BPF prog-id=185 op=UNLOAD May 10 00:46:21.783000 audit: BPF prog-id=184 op=UNLOAD May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.783000 audit: BPF prog-id=186 op=LOAD May 10 00:46:21.783000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020bac8 items=0 ppid=4168 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539643765366634636361646163363135653064333132386636333335 May 10 00:46:21.807127 env[1212]: time="2025-05-10T00:46:21.807026451Z" level=info msg="StartContainer for \"59d7e6f4ccadac615e0d3128f6335467cab8808ac32be3c0ad9e686a54bf1bb4\" returns successfully" May 10 00:46:22.163176 env[1212]: time="2025-05-10T00:46:22.163103558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:22.166020 env[1212]: time="2025-05-10T00:46:22.165959398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:22.168991 env[1212]: time="2025-05-10T00:46:22.168960574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:22.170857 env[1212]: time="2025-05-10T00:46:22.170791961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:22.171288 env[1212]: time="2025-05-10T00:46:22.171245491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:46:22.173368 env[1212]: time="2025-05-10T00:46:22.173341431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:46:22.174096 env[1212]: time="2025-05-10T00:46:22.174031463Z" level=info msg="CreateContainer within sandbox \"359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:46:22.188133 env[1212]: time="2025-05-10T00:46:22.188032073Z" level=info msg="CreateContainer within sandbox \"359e3ff704e3647dbe291a1500723ebe8f7cb39653283e59413fef8fcb8c4044\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"19a9e85e3f0b5431755747d8297a191dbe4d6cd9edc434fe3a01d03cbde8c613\"" May 10 00:46:22.188617 env[1212]: time="2025-05-10T00:46:22.188587959Z" level=info msg="StartContainer for \"19a9e85e3f0b5431755747d8297a191dbe4d6cd9edc434fe3a01d03cbde8c613\"" May 10 00:46:22.206084 systemd[1]: Started cri-containerd-19a9e85e3f0b5431755747d8297a191dbe4d6cd9edc434fe3a01d03cbde8c613.scope. May 10 00:46:22.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.220000 audit: BPF prog-id=187 op=LOAD May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3619 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613965383565336630623534333137353537343764383239376131 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3619 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613965383565336630623534333137353537343764383239376131 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit: BPF prog-id=188 op=LOAD May 10 00:46:22.221000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000309080 items=0 ppid=3619 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613965383565336630623534333137353537343764383239376131 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit: BPF prog-id=189 op=LOAD May 10 00:46:22.221000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003090c8 items=0 ppid=3619 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613965383565336630623534333137353537343764383239376131 May 10 00:46:22.221000 audit: BPF prog-id=189 op=UNLOAD May 10 00:46:22.221000 audit: BPF prog-id=188 op=UNLOAD May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:22.221000 audit: BPF prog-id=190 op=LOAD May 10 00:46:22.221000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003094d8 items=0 ppid=3619 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613965383565336630623534333137353537343764383239376131 May 10 00:46:22.238856 systemd-networkd[1022]: calicedd36a3ff0: Gained IPv6LL May 10 00:46:22.340190 env[1212]: time="2025-05-10T00:46:22.340102606Z" level=info msg="StartContainer for \"19a9e85e3f0b5431755747d8297a191dbe4d6cd9edc434fe3a01d03cbde8c613\" returns successfully" May 10 00:46:22.521911 kubelet[1950]: E0510 00:46:22.521857 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:22.555873 systemd-networkd[1022]: calia70e7d02e8a: Gained IPv6LL May 10 00:46:22.926374 kubelet[1950]: I0510 00:46:22.926223 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-7qqv8" podStartSLOduration=58.926199928 podStartE2EDuration="58.926199928s" podCreationTimestamp="2025-05-10 00:45:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:22.782961939 +0000 UTC m=+64.107132517" watchObservedRunningTime="2025-05-10 00:46:22.926199928 +0000 UTC m=+64.250370506" May 10 00:46:22.934000 audit[4339]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.934000 audit[4339]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc88dd5140 a2=0 a3=7ffc88dd512c items=0 ppid=2065 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.940000 audit[4339]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.940000 audit[4339]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc88dd5140 a2=0 a3=7ffc88dd512c items=0 ppid=2065 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.022000 audit[4341]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:23.022000 audit[4341]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd15f959a0 a2=0 a3=7ffd15f9598c items=0 ppid=2065 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.027000 audit[4341]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:23.027000 audit[4341]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd15f959a0 a2=0 a3=7ffd15f9598c items=0 ppid=2065 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.067901 systemd-networkd[1022]: cali51abc8de48c: Gained IPv6LL May 10 00:46:23.093652 kubelet[1950]: I0510 00:46:23.093573 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79df748467-qwlvl" podStartSLOduration=41.319627389 podStartE2EDuration="46.093549564s" podCreationTimestamp="2025-05-10 00:45:37 +0000 UTC" firstStartedPulling="2025-05-10 00:46:17.398511637 +0000 UTC m=+58.722682215" lastFinishedPulling="2025-05-10 00:46:22.172433812 +0000 UTC m=+63.496604390" observedRunningTime="2025-05-10 00:46:22.927131741 +0000 UTC m=+64.251302319" watchObservedRunningTime="2025-05-10 00:46:23.093549564 +0000 UTC m=+64.417720142" May 10 00:46:23.096877 env[1212]: time="2025-05-10T00:46:23.096806462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.148921 env[1212]: time="2025-05-10T00:46:23.148816733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.181140 env[1212]: time="2025-05-10T00:46:23.181003260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.195193 env[1212]: time="2025-05-10T00:46:23.195127881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.195965 env[1212]: time="2025-05-10T00:46:23.195916897Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:46:23.197169 env[1212]: time="2025-05-10T00:46:23.197017333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:46:23.198628 env[1212]: time="2025-05-10T00:46:23.198599643Z" level=info msg="CreateContainer within sandbox \"d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:46:23.420013 env[1212]: time="2025-05-10T00:46:23.419924499Z" level=info msg="CreateContainer within sandbox \"d8d027a1b495f56918edc62a11d88fa054f972b3ecbeebe5780f3b49950acf47\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"524393eff109e11352262345111789d21c75e7fbe2ff9db9551cf3f9c8ec1b32\"" May 10 00:46:23.420885 env[1212]: time="2025-05-10T00:46:23.420837521Z" level=info msg="StartContainer for \"524393eff109e11352262345111789d21c75e7fbe2ff9db9551cf3f9c8ec1b32\"" May 10 00:46:23.446188 systemd[1]: run-containerd-runc-k8s.io-524393eff109e11352262345111789d21c75e7fbe2ff9db9551cf3f9c8ec1b32-runc.i8evxe.mount: Deactivated successfully. May 10 00:46:23.447768 systemd[1]: Started cri-containerd-524393eff109e11352262345111789d21c75e7fbe2ff9db9551cf3f9c8ec1b32.scope. May 10 00:46:23.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit: BPF prog-id=191 op=LOAD May 10 00:46:23.464000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3979 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343339336566663130396531313335323236323334353131313738 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3979 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343339336566663130396531313335323236323334353131313738 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit: BPF prog-id=192 op=LOAD May 10 00:46:23.464000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000394840 items=0 ppid=3979 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343339336566663130396531313335323236323334353131313738 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit: BPF prog-id=193 op=LOAD May 10 00:46:23.465000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000394888 items=0 ppid=3979 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343339336566663130396531313335323236323334353131313738 May 10 00:46:23.465000 audit: BPF prog-id=193 op=UNLOAD May 10 00:46:23.465000 audit: BPF prog-id=192 op=UNLOAD May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit: BPF prog-id=194 op=LOAD May 10 00:46:23.465000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000394c98 items=0 ppid=3979 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343339336566663130396531313335323236323334353131313738 May 10 00:46:23.516026 systemd-networkd[1022]: calib7242321d64: Gained IPv6LL May 10 00:46:23.566336 env[1212]: time="2025-05-10T00:46:23.566261148Z" level=info msg="StartContainer for \"524393eff109e11352262345111789d21c75e7fbe2ff9db9551cf3f9c8ec1b32\" returns successfully" May 10 00:46:23.569963 kubelet[1950]: I0510 00:46:23.569911 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:46:23.570453 kubelet[1950]: E0510 00:46:23.570423 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:24.052000 audit[4380]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:24.052000 audit[4380]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb7bb7d30 a2=0 a3=7ffcb7bb7d1c items=0 ppid=2065 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:24.078000 audit[4380]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:24.078000 audit[4380]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcb7bb7d30 a2=0 a3=7ffcb7bb7d1c items=0 ppid=2065 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:24.547000 audit[4316]: AVC avc: denied { watch } for pid=4316 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_46_01.1504853323/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c574 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c213,c574 tclass=file permissive=0 May 10 00:46:24.547000 audit[4316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000da6a80 a2=fc6 a3=0 items=0 ppid=3619 pid=4316 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c574 key=(null) May 10 00:46:24.547000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:24.573271 kubelet[1950]: E0510 00:46:24.573215 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:24.585138 kubelet[1950]: I0510 00:46:24.585060 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79df748467-tz56m" podStartSLOduration=45.478053661 podStartE2EDuration="47.585039149s" podCreationTimestamp="2025-05-10 00:45:37 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.08983237 +0000 UTC m=+62.414002948" lastFinishedPulling="2025-05-10 00:46:23.196817848 +0000 UTC m=+64.520988436" observedRunningTime="2025-05-10 00:46:24.583418462 +0000 UTC m=+65.907589040" watchObservedRunningTime="2025-05-10 00:46:24.585039149 +0000 UTC m=+65.909209727" May 10 00:46:24.747000 audit[4359]: AVC avc: denied { watch } for pid=4359 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_46_01.1656560035/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c181,c393 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c181,c393 tclass=file permissive=0 May 10 00:46:24.747000 audit[4359]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f8e140 a2=fc6 a3=0 items=0 ppid=3979 pid=4359 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c181,c393 key=(null) May 10 00:46:24.747000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:25.098000 audit[4384]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:25.098000 audit[4384]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd7ca88290 a2=0 a3=7ffd7ca8827c items=0 ppid=2065 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:25.103000 audit[4384]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:25.103000 audit[4384]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd7ca88290 a2=0 a3=7ffd7ca8827c items=0 ppid=2065 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:25.684657 env[1212]: time="2025-05-10T00:46:25.684466191Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:25.687234 env[1212]: time="2025-05-10T00:46:25.687170700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:25.689040 env[1212]: time="2025-05-10T00:46:25.689002211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:25.690795 env[1212]: time="2025-05-10T00:46:25.690750491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:25.691343 env[1212]: time="2025-05-10T00:46:25.691320610Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:46:25.692521 env[1212]: time="2025-05-10T00:46:25.692493669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:46:25.693466 env[1212]: time="2025-05-10T00:46:25.693428130Z" level=info msg="CreateContainer within sandbox \"8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:46:25.712099 env[1212]: time="2025-05-10T00:46:25.712023866Z" level=info msg="CreateContainer within sandbox \"8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"427e668611979fb1a3357aa5149c6e698445fc3b3e9eb7ef180e671646b0229b\"" May 10 00:46:25.712690 env[1212]: time="2025-05-10T00:46:25.712657983Z" level=info msg="StartContainer for \"427e668611979fb1a3357aa5149c6e698445fc3b3e9eb7ef180e671646b0229b\"" May 10 00:46:25.734270 systemd[1]: Started cri-containerd-427e668611979fb1a3357aa5149c6e698445fc3b3e9eb7ef180e671646b0229b.scope. May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fcff02c59e8 items=0 ppid=4042 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376536363836313139373966623161333335376161353134396336 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit: BPF prog-id=195 op=LOAD May 10 00:46:25.747000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000280d58 items=0 ppid=4042 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376536363836313139373966623161333335376161353134396336 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit: BPF prog-id=196 op=LOAD May 10 00:46:25.747000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000280da8 items=0 ppid=4042 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376536363836313139373966623161333335376161353134396336 May 10 00:46:25.747000 audit: BPF prog-id=196 op=UNLOAD May 10 00:46:25.747000 audit: BPF prog-id=195 op=UNLOAD May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.747000 audit: BPF prog-id=197 op=LOAD May 10 00:46:25.747000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000280e38 items=0 ppid=4042 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376536363836313139373966623161333335376161353134396336 May 10 00:46:25.762060 env[1212]: time="2025-05-10T00:46:25.762008670Z" level=info msg="StartContainer for \"427e668611979fb1a3357aa5149c6e698445fc3b3e9eb7ef180e671646b0229b\" returns successfully" May 10 00:46:26.472509 systemd[1]: Started sshd@11-10.0.0.116:22-10.0.0.1:55600.service. May 10 00:46:26.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.116:22-10.0.0.1:55600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.473892 kernel: kauditd_printk_skb: 482 callbacks suppressed May 10 00:46:26.473967 kernel: audit: type=1130 audit(1746837986.470:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.116:22-10.0.0.1:55600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.507000 audit[4422]: USER_ACCT pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.509263 sshd[4422]: Accepted publickey for core from 10.0.0.1 port 55600 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:26.511000 audit[4422]: CRED_ACQ pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.513966 sshd[4422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:26.517405 kernel: audit: type=1101 audit(1746837986.507:1353): pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.517545 kernel: audit: type=1103 audit(1746837986.511:1354): pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.517795 kernel: audit: type=1006 audit(1746837986.511:1355): pid=4422 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 10 00:46:26.518167 systemd-logind[1200]: New session 12 of user core. May 10 00:46:26.519036 systemd[1]: Started session-12.scope. May 10 00:46:26.511000 audit[4422]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc93dc4710 a2=3 a3=0 items=0 ppid=1 pid=4422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.523932 kernel: audit: type=1300 audit(1746837986.511:1355): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc93dc4710 a2=3 a3=0 items=0 ppid=1 pid=4422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.524004 kernel: audit: type=1327 audit(1746837986.511:1355): proctitle=737368643A20636F7265205B707269765D May 10 00:46:26.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:26.525478 kernel: audit: type=1105 audit(1746837986.522:1356): pid=4422 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.522000 audit[4422]: USER_START pid=4422 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.529865 kernel: audit: type=1103 audit(1746837986.523:1357): pid=4424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.523000 audit[4424]: CRED_ACQ pid=4424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.636309 sshd[4422]: pam_unix(sshd:session): session closed for user core May 10 00:46:26.635000 audit[4422]: USER_END pid=4422 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.639902 systemd[1]: sshd@11-10.0.0.116:22-10.0.0.1:55600.service: Deactivated successfully. May 10 00:46:26.640662 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:46:26.641295 systemd-logind[1200]: Session 12 logged out. Waiting for processes to exit. May 10 00:46:26.642897 systemd[1]: Started sshd@12-10.0.0.116:22-10.0.0.1:46150.service. May 10 00:46:26.647782 kernel: audit: type=1106 audit(1746837986.635:1358): pid=4422 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.647934 kernel: audit: type=1104 audit(1746837986.635:1359): pid=4422 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.635000 audit[4422]: CRED_DISP pid=4422 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.116:22-10.0.0.1:55600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.116:22-10.0.0.1:46150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.644452 systemd-logind[1200]: Removed session 12. May 10 00:46:26.673000 audit[4436]: USER_ACCT pid=4436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.675966 sshd[4436]: Accepted publickey for core from 10.0.0.1 port 46150 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:26.675000 audit[4436]: CRED_ACQ pid=4436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.675000 audit[4436]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa3767cb0 a2=3 a3=0 items=0 ppid=1 pid=4436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.675000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:26.676860 sshd[4436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:26.680867 systemd-logind[1200]: New session 13 of user core. May 10 00:46:26.682006 systemd[1]: Started session-13.scope. May 10 00:46:26.685000 audit[4436]: USER_START pid=4436 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.686000 audit[4440]: CRED_ACQ pid=4440 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.802040 kubelet[1950]: E0510 00:46:26.801881 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:26.820409 sshd[4436]: pam_unix(sshd:session): session closed for user core May 10 00:46:26.819000 audit[4436]: USER_END pid=4436 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.819000 audit[4436]: CRED_DISP pid=4436 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.823276 systemd[1]: sshd@12-10.0.0.116:22-10.0.0.1:46150.service: Deactivated successfully. May 10 00:46:26.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.116:22-10.0.0.1:46150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.823822 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:46:26.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.116:22-10.0.0.1:46162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.825348 systemd[1]: Started sshd@13-10.0.0.116:22-10.0.0.1:46162.service. May 10 00:46:26.826899 systemd-logind[1200]: Session 13 logged out. Waiting for processes to exit. May 10 00:46:26.828373 systemd-logind[1200]: Removed session 13. May 10 00:46:26.868659 sshd[4455]: Accepted publickey for core from 10.0.0.1 port 46162 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:26.869983 sshd[4455]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:26.866000 audit[4455]: USER_ACCT pid=4455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.867000 audit[4455]: CRED_ACQ pid=4455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.867000 audit[4455]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca6189cf0 a2=3 a3=0 items=0 ppid=1 pid=4455 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.867000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:26.875476 systemd[1]: Started session-14.scope. May 10 00:46:26.877032 systemd-logind[1200]: New session 14 of user core. May 10 00:46:26.885000 audit[4455]: USER_START pid=4455 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:26.886000 audit[4458]: CRED_ACQ pid=4458 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:27.029414 sshd[4455]: pam_unix(sshd:session): session closed for user core May 10 00:46:27.029000 audit[4455]: USER_END pid=4455 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:27.029000 audit[4455]: CRED_DISP pid=4455 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:27.032375 systemd[1]: sshd@13-10.0.0.116:22-10.0.0.1:46162.service: Deactivated successfully. May 10 00:46:27.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.116:22-10.0.0.1:46162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:27.033166 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:46:27.034128 systemd-logind[1200]: Session 14 logged out. Waiting for processes to exit. May 10 00:46:27.035970 systemd-logind[1200]: Removed session 14. May 10 00:46:28.152485 env[1212]: time="2025-05-10T00:46:28.152406560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.154477 env[1212]: time="2025-05-10T00:46:28.154446119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.156340 env[1212]: time="2025-05-10T00:46:28.156277163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.158281 env[1212]: time="2025-05-10T00:46:28.158220093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:28.158879 env[1212]: time="2025-05-10T00:46:28.158833430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:46:28.160784 env[1212]: time="2025-05-10T00:46:28.160747337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:46:28.168600 env[1212]: time="2025-05-10T00:46:28.168535609Z" level=info msg="CreateContainer within sandbox \"0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:46:28.192352 env[1212]: time="2025-05-10T00:46:28.192278818Z" level=info msg="CreateContainer within sandbox \"0f7f4a8f5e3fafd1e451576dcbbc63ac638871b0435aead4db8928835330e808\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4269e5f6aaf395b17045ef294c1409f61d6604b4deabd7a028a4f32988caabb2\"" May 10 00:46:28.193494 env[1212]: time="2025-05-10T00:46:28.193437866Z" level=info msg="StartContainer for \"4269e5f6aaf395b17045ef294c1409f61d6604b4deabd7a028a4f32988caabb2\"" May 10 00:46:28.211953 systemd[1]: Started cri-containerd-4269e5f6aaf395b17045ef294c1409f61d6604b4deabd7a028a4f32988caabb2.scope. May 10 00:46:28.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit: BPF prog-id=198 op=LOAD May 10 00:46:28.232000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.232000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4215 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363965356636616166333935623137303435656632393463313430 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4215 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363965356636616166333935623137303435656632393463313430 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit: BPF prog-id=199 op=LOAD May 10 00:46:28.233000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dd320 items=0 ppid=4215 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363965356636616166333935623137303435656632393463313430 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit: BPF prog-id=200 op=LOAD May 10 00:46:28.233000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dd368 items=0 ppid=4215 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363965356636616166333935623137303435656632393463313430 May 10 00:46:28.233000 audit: BPF prog-id=200 op=UNLOAD May 10 00:46:28.233000 audit: BPF prog-id=199 op=UNLOAD May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.233000 audit: BPF prog-id=201 op=LOAD May 10 00:46:28.233000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dd778 items=0 ppid=4215 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363965356636616166333935623137303435656632393463313430 May 10 00:46:28.903524 env[1212]: time="2025-05-10T00:46:28.903450602Z" level=info msg="StartContainer for \"4269e5f6aaf395b17045ef294c1409f61d6604b4deabd7a028a4f32988caabb2\" returns successfully" May 10 00:46:29.978213 kubelet[1950]: I0510 00:46:29.978139 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-576db6cf6d-x79r6" podStartSLOduration=45.56873985 podStartE2EDuration="51.978115479s" podCreationTimestamp="2025-05-10 00:45:38 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.750433639 +0000 UTC m=+63.074604207" lastFinishedPulling="2025-05-10 00:46:28.159809258 +0000 UTC m=+69.483979836" observedRunningTime="2025-05-10 00:46:29.928303464 +0000 UTC m=+71.252474072" watchObservedRunningTime="2025-05-10 00:46:29.978115479 +0000 UTC m=+71.302286077" May 10 00:46:30.670454 env[1212]: time="2025-05-10T00:46:30.670368504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.672588 env[1212]: time="2025-05-10T00:46:30.672540664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.674377 env[1212]: time="2025-05-10T00:46:30.674333450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.676063 env[1212]: time="2025-05-10T00:46:30.676010491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.676412 env[1212]: time="2025-05-10T00:46:30.676370590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:46:30.678763 env[1212]: time="2025-05-10T00:46:30.678688834Z" level=info msg="CreateContainer within sandbox \"8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:46:30.697874 env[1212]: time="2025-05-10T00:46:30.697819817Z" level=info msg="CreateContainer within sandbox \"8a8d87ddc2ad4af7f505cc2dfd6b8d914d36feddd77f7d8c783cfd000ee28880\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"72ef4692abceb0c7ae5486fd741214e51334fcc45293e4e20868fa822126f863\"" May 10 00:46:30.698403 env[1212]: time="2025-05-10T00:46:30.698379279Z" level=info msg="StartContainer for \"72ef4692abceb0c7ae5486fd741214e51334fcc45293e4e20868fa822126f863\"" May 10 00:46:30.720204 systemd[1]: Started cri-containerd-72ef4692abceb0c7ae5486fd741214e51334fcc45293e4e20868fa822126f863.scope. May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc2be12fa18 items=0 ppid=4042 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732656634363932616263656230633761653534383666643734313231 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit: BPF prog-id=202 op=LOAD May 10 00:46:30.734000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dfba8 items=0 ppid=4042 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732656634363932616263656230633761653534383666643734313231 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit: BPF prog-id=203 op=LOAD May 10 00:46:30.734000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dfbf8 items=0 ppid=4042 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732656634363932616263656230633761653534383666643734313231 May 10 00:46:30.734000 audit: BPF prog-id=203 op=UNLOAD May 10 00:46:30.734000 audit: BPF prog-id=202 op=UNLOAD May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.734000 audit: BPF prog-id=204 op=LOAD May 10 00:46:30.734000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dfc88 items=0 ppid=4042 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732656634363932616263656230633761653534383666643734313231 May 10 00:46:30.884691 env[1212]: time="2025-05-10T00:46:30.884600000Z" level=info msg="StartContainer for \"72ef4692abceb0c7ae5486fd741214e51334fcc45293e4e20868fa822126f863\" returns successfully" May 10 00:46:31.391694 kubelet[1950]: I0510 00:46:31.391636 1950 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:46:31.391694 kubelet[1950]: I0510 00:46:31.391691 1950 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:46:32.035073 systemd[1]: Started sshd@14-10.0.0.116:22-10.0.0.1:46166.service. May 10 00:46:32.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.116:22-10.0.0.1:46166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:32.036375 kernel: kauditd_printk_skb: 123 callbacks suppressed May 10 00:46:32.036574 kernel: audit: type=1130 audit(1746837992.034:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.116:22-10.0.0.1:46166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:32.071000 audit[4585]: USER_ACCT pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.072689 sshd[4585]: Accepted publickey for core from 10.0.0.1 port 46166 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:32.076000 audit[4585]: CRED_ACQ pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.078036 sshd[4585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:32.081646 systemd-logind[1200]: New session 15 of user core. May 10 00:46:32.083733 kernel: audit: type=1101 audit(1746837992.071:1404): pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.083801 kernel: audit: type=1103 audit(1746837992.076:1405): pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.083838 kernel: audit: type=1006 audit(1746837992.076:1406): pid=4585 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:46:32.082684 systemd[1]: Started session-15.scope. May 10 00:46:32.076000 audit[4585]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e75f430 a2=3 a3=0 items=0 ppid=1 pid=4585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:32.089747 kernel: audit: type=1300 audit(1746837992.076:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e75f430 a2=3 a3=0 items=0 ppid=1 pid=4585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:32.089820 kernel: audit: type=1327 audit(1746837992.076:1406): proctitle=737368643A20636F7265205B707269765D May 10 00:46:32.076000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:32.091270 kernel: audit: type=1105 audit(1746837992.086:1407): pid=4585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.086000 audit[4585]: USER_START pid=4585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.088000 audit[4587]: CRED_ACQ pid=4587 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.105472 kernel: audit: type=1103 audit(1746837992.088:1408): pid=4587 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.224250 sshd[4585]: pam_unix(sshd:session): session closed for user core May 10 00:46:32.224000 audit[4585]: USER_END pid=4585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.227254 systemd[1]: sshd@14-10.0.0.116:22-10.0.0.1:46166.service: Deactivated successfully. May 10 00:46:32.227997 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:46:32.228641 systemd-logind[1200]: Session 15 logged out. Waiting for processes to exit. May 10 00:46:32.229513 systemd-logind[1200]: Removed session 15. May 10 00:46:32.224000 audit[4585]: CRED_DISP pid=4585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.234155 kernel: audit: type=1106 audit(1746837992.224:1409): pid=4585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.234260 kernel: audit: type=1104 audit(1746837992.224:1410): pid=4585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:32.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.116:22-10.0.0.1:46166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:35.854129 kubelet[1950]: E0510 00:46:35.854090 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:35.874549 kubelet[1950]: I0510 00:46:35.874471 1950 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gb6dh" podStartSLOduration=48.287353937 podStartE2EDuration="57.874451754s" podCreationTimestamp="2025-05-10 00:45:38 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.090249741 +0000 UTC m=+62.414420319" lastFinishedPulling="2025-05-10 00:46:30.677347558 +0000 UTC m=+72.001518136" observedRunningTime="2025-05-10 00:46:30.933271806 +0000 UTC m=+72.257442384" watchObservedRunningTime="2025-05-10 00:46:35.874451754 +0000 UTC m=+77.198622332" May 10 00:46:37.229227 systemd[1]: Started sshd@15-10.0.0.116:22-10.0.0.1:42964.service. May 10 00:46:37.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.116:22-10.0.0.1:42964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.230532 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:37.230595 kernel: audit: type=1130 audit(1746837997.228:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.116:22-10.0.0.1:42964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.260000 audit[4632]: USER_ACCT pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.261556 sshd[4632]: Accepted publickey for core from 10.0.0.1 port 42964 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:37.263215 sshd[4632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:37.268348 systemd-logind[1200]: New session 16 of user core. May 10 00:46:37.262000 audit[4632]: CRED_ACQ pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.268844 systemd[1]: Started session-16.scope. May 10 00:46:37.273798 kernel: audit: type=1101 audit(1746837997.260:1413): pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.273880 kernel: audit: type=1103 audit(1746837997.262:1414): pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.277046 kernel: audit: type=1006 audit(1746837997.262:1415): pid=4632 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:46:37.277139 kernel: audit: type=1300 audit(1746837997.262:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeae0570a0 a2=3 a3=0 items=0 ppid=1 pid=4632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.262000 audit[4632]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeae0570a0 a2=3 a3=0 items=0 ppid=1 pid=4632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.282339 kernel: audit: type=1327 audit(1746837997.262:1415): proctitle=737368643A20636F7265205B707269765D May 10 00:46:37.262000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:37.273000 audit[4632]: USER_START pid=4632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.290159 kernel: audit: type=1105 audit(1746837997.273:1416): pid=4632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.275000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.295735 kernel: audit: type=1103 audit(1746837997.275:1417): pid=4634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.448005 sshd[4632]: pam_unix(sshd:session): session closed for user core May 10 00:46:37.448000 audit[4632]: USER_END pid=4632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.451165 systemd[1]: sshd@15-10.0.0.116:22-10.0.0.1:42964.service: Deactivated successfully. May 10 00:46:37.451986 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:46:37.455436 systemd-logind[1200]: Session 16 logged out. Waiting for processes to exit. May 10 00:46:37.448000 audit[4632]: CRED_DISP pid=4632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.456371 systemd-logind[1200]: Removed session 16. May 10 00:46:37.461746 kernel: audit: type=1106 audit(1746837997.448:1418): pid=4632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.461821 kernel: audit: type=1104 audit(1746837997.448:1419): pid=4632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:37.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.116:22-10.0.0.1:42964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:41.802428 kubelet[1950]: E0510 00:46:41.802342 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:42.452462 systemd[1]: Started sshd@16-10.0.0.116:22-10.0.0.1:42966.service. May 10 00:46:42.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.116:22-10.0.0.1:42966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.474522 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:42.474610 kernel: audit: type=1130 audit(1746838002.451:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.116:22-10.0.0.1:42966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.500000 audit[4650]: USER_ACCT pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.501569 sshd[4650]: Accepted publickey for core from 10.0.0.1 port 42966 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:42.503581 sshd[4650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:42.507373 systemd-logind[1200]: New session 17 of user core. May 10 00:46:42.507749 systemd[1]: Started session-17.scope. May 10 00:46:42.502000 audit[4650]: CRED_ACQ pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.521112 kernel: audit: type=1101 audit(1746838002.500:1422): pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.521364 kernel: audit: type=1103 audit(1746838002.502:1423): pid=4650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.521411 kernel: audit: type=1006 audit(1746838002.502:1424): pid=4650 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:46:42.523446 kernel: audit: type=1300 audit(1746838002.502:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1a0c8b00 a2=3 a3=0 items=0 ppid=1 pid=4650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.502000 audit[4650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1a0c8b00 a2=3 a3=0 items=0 ppid=1 pid=4650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.529311 kernel: audit: type=1327 audit(1746838002.502:1424): proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.529371 kernel: audit: type=1105 audit(1746838002.511:1425): pid=4650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.511000 audit[4650]: USER_START pid=4650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.512000 audit[4652]: CRED_ACQ pid=4652 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.584742 kernel: audit: type=1103 audit(1746838002.512:1426): pid=4652 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.655398 sshd[4650]: pam_unix(sshd:session): session closed for user core May 10 00:46:42.656000 audit[4650]: USER_END pid=4650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.658271 systemd[1]: sshd@16-10.0.0.116:22-10.0.0.1:42966.service: Deactivated successfully. May 10 00:46:42.659006 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:46:42.656000 audit[4650]: CRED_DISP pid=4650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.667036 kernel: audit: type=1106 audit(1746838002.656:1427): pid=4650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.667115 kernel: audit: type=1104 audit(1746838002.656:1428): pid=4650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:42.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.116:22-10.0.0.1:42966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.667769 systemd-logind[1200]: Session 17 logged out. Waiting for processes to exit. May 10 00:46:42.668731 systemd-logind[1200]: Removed session 17. May 10 00:46:47.661227 systemd[1]: Started sshd@17-10.0.0.116:22-10.0.0.1:54544.service. May 10 00:46:47.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.116:22-10.0.0.1:54544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.662543 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:47.662636 kernel: audit: type=1130 audit(1746838007.659:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.116:22-10.0.0.1:54544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.699000 audit[4664]: USER_ACCT pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.701263 sshd[4664]: Accepted publickey for core from 10.0.0.1 port 54544 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:47.703807 sshd[4664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:47.701000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.708780 kernel: audit: type=1101 audit(1746838007.699:1431): pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.708949 kernel: audit: type=1103 audit(1746838007.701:1432): pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.708787 systemd-logind[1200]: New session 18 of user core. May 10 00:46:47.710064 systemd[1]: Started session-18.scope. May 10 00:46:47.711566 kernel: audit: type=1006 audit(1746838007.701:1433): pid=4664 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:46:47.711855 kernel: audit: type=1300 audit(1746838007.701:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2a1b950 a2=3 a3=0 items=0 ppid=1 pid=4664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.701000 audit[4664]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2a1b950 a2=3 a3=0 items=0 ppid=1 pid=4664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:47.717052 kernel: audit: type=1327 audit(1746838007.701:1433): proctitle=737368643A20636F7265205B707269765D May 10 00:46:47.717162 kernel: audit: type=1105 audit(1746838007.714:1434): pid=4664 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.714000 audit[4664]: USER_START pid=4664 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.716000 audit[4666]: CRED_ACQ pid=4666 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.725666 kernel: audit: type=1103 audit(1746838007.716:1435): pid=4666 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.802540 kubelet[1950]: E0510 00:46:47.802487 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:47.839976 sshd[4664]: pam_unix(sshd:session): session closed for user core May 10 00:46:47.839000 audit[4664]: USER_END pid=4664 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.842898 systemd[1]: sshd@17-10.0.0.116:22-10.0.0.1:54544.service: Deactivated successfully. May 10 00:46:47.843951 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:46:47.844620 systemd-logind[1200]: Session 18 logged out. Waiting for processes to exit. May 10 00:46:47.839000 audit[4664]: CRED_DISP pid=4664 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.845665 systemd-logind[1200]: Removed session 18. May 10 00:46:47.849129 kernel: audit: type=1106 audit(1746838007.839:1436): pid=4664 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.849202 kernel: audit: type=1104 audit(1746838007.839:1437): pid=4664 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:47.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.116:22-10.0.0.1:54544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:51.031889 kubelet[1950]: I0510 00:46:51.031835 1950 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:46:51.365000 audit[4679]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:51.365000 audit[4679]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd2a7e33e0 a2=0 a3=7ffd2a7e33cc items=0 ppid=2065 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:51.376000 audit[4679]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=4679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:51.376000 audit[4679]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd2a7e33e0 a2=0 a3=7ffd2a7e33cc items=0 ppid=2065 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:51.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:52.844869 systemd[1]: Started sshd@18-10.0.0.116:22-10.0.0.1:54546.service. May 10 00:46:52.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.116:22-10.0.0.1:54546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:52.845960 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:46:52.846033 kernel: audit: type=1130 audit(1746838012.844:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.116:22-10.0.0.1:54546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:52.878000 audit[4682]: USER_ACCT pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.879689 sshd[4682]: Accepted publickey for core from 10.0.0.1 port 54546 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:52.883158 sshd[4682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:52.882000 audit[4682]: CRED_ACQ pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.887299 kernel: audit: type=1101 audit(1746838012.878:1442): pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.887362 kernel: audit: type=1103 audit(1746838012.882:1443): pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.887384 kernel: audit: type=1006 audit(1746838012.882:1444): pid=4682 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 10 00:46:52.886967 systemd-logind[1200]: New session 19 of user core. May 10 00:46:52.887854 systemd[1]: Started session-19.scope. May 10 00:46:52.882000 audit[4682]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2e9ac840 a2=3 a3=0 items=0 ppid=1 pid=4682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:52.893526 kernel: audit: type=1300 audit(1746838012.882:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2e9ac840 a2=3 a3=0 items=0 ppid=1 pid=4682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:52.893585 kernel: audit: type=1327 audit(1746838012.882:1444): proctitle=737368643A20636F7265205B707269765D May 10 00:46:52.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:52.891000 audit[4682]: USER_START pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.899425 kernel: audit: type=1105 audit(1746838012.891:1445): pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.899517 kernel: audit: type=1103 audit(1746838012.893:1446): pid=4684 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:52.893000 audit[4684]: CRED_ACQ pid=4684 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.116:22-10.0.0.1:54554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.085288 systemd[1]: Started sshd@19-10.0.0.116:22-10.0.0.1:54554.service. May 10 00:46:53.089008 sshd[4682]: pam_unix(sshd:session): session closed for user core May 10 00:46:53.089750 kernel: audit: type=1130 audit(1746838013.084:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.116:22-10.0.0.1:54554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.094533 systemd[1]: sshd@18-10.0.0.116:22-10.0.0.1:54546.service: Deactivated successfully. May 10 00:46:53.092000 audit[4682]: USER_END pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.096766 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:46:53.105751 kernel: audit: type=1106 audit(1746838013.092:1448): pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.105380 systemd-logind[1200]: Session 19 logged out. Waiting for processes to exit. May 10 00:46:53.106763 systemd-logind[1200]: Removed session 19. May 10 00:46:53.092000 audit[4682]: CRED_DISP pid=4682 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.116:22-10.0.0.1:54546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.129000 audit[4694]: USER_ACCT pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.130320 sshd[4694]: Accepted publickey for core from 10.0.0.1 port 54554 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:53.130000 audit[4694]: CRED_ACQ pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.130000 audit[4694]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec3019a00 a2=3 a3=0 items=0 ppid=1 pid=4694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:53.131619 sshd[4694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:53.135177 systemd-logind[1200]: New session 20 of user core. May 10 00:46:53.136264 systemd[1]: Started session-20.scope. May 10 00:46:53.140000 audit[4694]: USER_START pid=4694 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.141000 audit[4697]: CRED_ACQ pid=4697 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.939177 sshd[4694]: pam_unix(sshd:session): session closed for user core May 10 00:46:53.939000 audit[4694]: USER_END pid=4694 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.939000 audit[4694]: CRED_DISP pid=4694 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.942434 systemd[1]: sshd@19-10.0.0.116:22-10.0.0.1:54554.service: Deactivated successfully. May 10 00:46:53.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.116:22-10.0.0.1:54554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.942997 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:46:53.943471 systemd-logind[1200]: Session 20 logged out. Waiting for processes to exit. May 10 00:46:53.944776 systemd[1]: Started sshd@20-10.0.0.116:22-10.0.0.1:54558.service. May 10 00:46:53.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.116:22-10.0.0.1:54558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.945529 systemd-logind[1200]: Removed session 20. May 10 00:46:53.978000 audit[4706]: USER_ACCT pid=4706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.979413 sshd[4706]: Accepted publickey for core from 10.0.0.1 port 54558 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:53.979000 audit[4706]: CRED_ACQ pid=4706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.979000 audit[4706]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde8fbe130 a2=3 a3=0 items=0 ppid=1 pid=4706 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.979000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:53.980564 sshd[4706]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:53.984132 systemd-logind[1200]: New session 21 of user core. May 10 00:46:53.985161 systemd[1]: Started session-21.scope. May 10 00:46:53.988000 audit[4706]: USER_START pid=4706 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:53.990000 audit[4708]: CRED_ACQ pid=4708 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:55.881000 audit[4726]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.881000 audit[4726]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdb86fc380 a2=0 a3=7ffdb86fc36c items=0 ppid=2065 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.890000 audit[4726]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.890000 audit[4726]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb86fc380 a2=0 a3=0 items=0 ppid=2065 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.906000 audit[4728]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=4728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.906000 audit[4728]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff37174720 a2=0 a3=7fff3717470c items=0 ppid=2065 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.908910 sshd[4706]: pam_unix(sshd:session): session closed for user core May 10 00:46:55.909000 audit[4706]: USER_END pid=4706 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:55.909000 audit[4706]: CRED_DISP pid=4706 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:55.912164 systemd[1]: Started sshd@21-10.0.0.116:22-10.0.0.1:54566.service. May 10 00:46:55.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.116:22-10.0.0.1:54566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.912935 systemd[1]: sshd@20-10.0.0.116:22-10.0.0.1:54558.service: Deactivated successfully. May 10 00:46:55.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.116:22-10.0.0.1:54558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.913640 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:46:55.915085 systemd-logind[1200]: Session 21 logged out. Waiting for processes to exit. May 10 00:46:55.916670 systemd-logind[1200]: Removed session 21. May 10 00:46:55.920000 audit[4728]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:55.920000 audit[4728]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff37174720 a2=0 a3=0 items=0 ppid=2065 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:55.947000 audit[4730]: USER_ACCT pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:55.948143 sshd[4730]: Accepted publickey for core from 10.0.0.1 port 54566 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:55.948000 audit[4730]: CRED_ACQ pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:55.948000 audit[4730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff42912940 a2=3 a3=0 items=0 ppid=1 pid=4730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:55.949498 sshd[4730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:55.954100 systemd[1]: Started session-22.scope. May 10 00:46:55.954266 systemd-logind[1200]: New session 22 of user core. May 10 00:46:55.958000 audit[4730]: USER_START pid=4730 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:55.959000 audit[4733]: CRED_ACQ pid=4733 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.376635 sshd[4730]: pam_unix(sshd:session): session closed for user core May 10 00:46:56.377000 audit[4730]: USER_END pid=4730 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.377000 audit[4730]: CRED_DISP pid=4730 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.380295 systemd[1]: sshd@21-10.0.0.116:22-10.0.0.1:54566.service: Deactivated successfully. May 10 00:46:56.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.116:22-10.0.0.1:54566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:56.381016 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:46:56.381899 systemd-logind[1200]: Session 22 logged out. Waiting for processes to exit. May 10 00:46:56.383099 systemd[1]: Started sshd@22-10.0.0.116:22-10.0.0.1:54580.service. May 10 00:46:56.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.116:22-10.0.0.1:54580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:56.384043 systemd-logind[1200]: Removed session 22. May 10 00:46:56.417000 audit[4743]: USER_ACCT pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.418440 sshd[4743]: Accepted publickey for core from 10.0.0.1 port 54580 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:46:56.419000 audit[4743]: CRED_ACQ pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.419000 audit[4743]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc8a265d0 a2=3 a3=0 items=0 ppid=1 pid=4743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:56.420315 sshd[4743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:56.424795 systemd-logind[1200]: New session 23 of user core. May 10 00:46:56.426031 systemd[1]: Started session-23.scope. May 10 00:46:56.431000 audit[4743]: USER_START pid=4743 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.433000 audit[4745]: CRED_ACQ pid=4745 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.592672 sshd[4743]: pam_unix(sshd:session): session closed for user core May 10 00:46:56.593000 audit[4743]: USER_END pid=4743 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.593000 audit[4743]: CRED_DISP pid=4743 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:46:56.595426 systemd[1]: sshd@22-10.0.0.116:22-10.0.0.1:54580.service: Deactivated successfully. May 10 00:46:56.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.116:22-10.0.0.1:54580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:56.596402 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:46:56.597364 systemd-logind[1200]: Session 23 logged out. Waiting for processes to exit. May 10 00:46:56.598233 systemd-logind[1200]: Removed session 23. May 10 00:46:56.802680 kubelet[1950]: E0510 00:46:56.802634 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:46:59.802431 kubelet[1950]: E0510 00:46:59.802369 1950 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:47:01.598584 systemd[1]: Started sshd@23-10.0.0.116:22-10.0.0.1:51796.service. May 10 00:47:01.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.116:22-10.0.0.1:51796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:01.599993 kernel: kauditd_printk_skb: 57 callbacks suppressed May 10 00:47:01.600057 kernel: audit: type=1130 audit(1746838021.598:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.116:22-10.0.0.1:51796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:01.632000 audit[4781]: USER_ACCT pid=4781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.649968 kernel: audit: type=1101 audit(1746838021.632:1491): pid=4781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.650031 kernel: audit: type=1103 audit(1746838021.634:1492): pid=4781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.650050 kernel: audit: type=1006 audit(1746838021.634:1493): pid=4781 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:47:01.634000 audit[4781]: CRED_ACQ pid=4781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.650127 sshd[4781]: Accepted publickey for core from 10.0.0.1 port 51796 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:47:01.635262 sshd[4781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:01.640306 systemd[1]: Started session-24.scope. May 10 00:47:01.640449 systemd-logind[1200]: New session 24 of user core. May 10 00:47:01.634000 audit[4781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff13e453d0 a2=3 a3=0 items=0 ppid=1 pid=4781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:01.655749 kernel: audit: type=1300 audit(1746838021.634:1493): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff13e453d0 a2=3 a3=0 items=0 ppid=1 pid=4781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:01.655882 kernel: audit: type=1327 audit(1746838021.634:1493): proctitle=737368643A20636F7265205B707269765D May 10 00:47:01.634000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:01.644000 audit[4781]: USER_START pid=4781 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.661726 kernel: audit: type=1105 audit(1746838021.644:1494): pid=4781 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.661779 kernel: audit: type=1103 audit(1746838021.646:1495): pid=4783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.646000 audit[4783]: CRED_ACQ pid=4783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.756061 sshd[4781]: pam_unix(sshd:session): session closed for user core May 10 00:47:01.756000 audit[4781]: USER_END pid=4781 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.758929 systemd[1]: sshd@23-10.0.0.116:22-10.0.0.1:51796.service: Deactivated successfully. May 10 00:47:01.759648 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:47:01.760529 systemd-logind[1200]: Session 24 logged out. Waiting for processes to exit. May 10 00:47:01.761469 systemd-logind[1200]: Removed session 24. May 10 00:47:01.756000 audit[4781]: CRED_DISP pid=4781 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.765172 kernel: audit: type=1106 audit(1746838021.756:1496): pid=4781 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.765239 kernel: audit: type=1104 audit(1746838021.756:1497): pid=4781 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:01.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.116:22-10.0.0.1:51796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:04.503000 audit[4796]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:04.503000 audit[4796]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffa597fcf0 a2=0 a3=7fffa597fcdc items=0 ppid=2065 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:04.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:04.508000 audit[4796]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:04.508000 audit[4796]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffa597fcf0 a2=0 a3=7fffa597fcdc items=0 ppid=2065 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:04.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:06.760997 systemd[1]: Started sshd@24-10.0.0.116:22-10.0.0.1:45840.service. May 10 00:47:06.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.116:22-10.0.0.1:45840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:06.762324 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:47:06.762552 kernel: audit: type=1130 audit(1746838026.759:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.116:22-10.0.0.1:45840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:06.794000 audit[4821]: USER_ACCT pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.796922 sshd[4821]: Accepted publickey for core from 10.0.0.1 port 45840 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:47:06.799039 sshd[4821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:06.796000 audit[4821]: CRED_ACQ pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.804992 kernel: audit: type=1101 audit(1746838026.794:1502): pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.805057 kernel: audit: type=1103 audit(1746838026.796:1503): pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.805087 kernel: audit: type=1006 audit(1746838026.797:1504): pid=4821 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:47:06.804584 systemd[1]: Started session-25.scope. May 10 00:47:06.804932 systemd-logind[1200]: New session 25 of user core. May 10 00:47:06.797000 audit[4821]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2a30b9b0 a2=3 a3=0 items=0 ppid=1 pid=4821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:06.811314 kernel: audit: type=1300 audit(1746838026.797:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2a30b9b0 a2=3 a3=0 items=0 ppid=1 pid=4821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:06.811371 kernel: audit: type=1327 audit(1746838026.797:1504): proctitle=737368643A20636F7265205B707269765D May 10 00:47:06.797000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:06.807000 audit[4821]: USER_START pid=4821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.817237 kernel: audit: type=1105 audit(1746838026.807:1505): pid=4821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.817292 kernel: audit: type=1103 audit(1746838026.808:1506): pid=4823 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.808000 audit[4823]: CRED_ACQ pid=4823 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.924665 sshd[4821]: pam_unix(sshd:session): session closed for user core May 10 00:47:06.923000 audit[4821]: USER_END pid=4821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.924000 audit[4821]: CRED_DISP pid=4821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.927184 systemd[1]: sshd@24-10.0.0.116:22-10.0.0.1:45840.service: Deactivated successfully. May 10 00:47:06.927964 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:47:06.928618 systemd-logind[1200]: Session 25 logged out. Waiting for processes to exit. May 10 00:47:06.929310 systemd-logind[1200]: Removed session 25. May 10 00:47:06.935265 kernel: audit: type=1106 audit(1746838026.923:1507): pid=4821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.935435 kernel: audit: type=1104 audit(1746838026.924:1508): pid=4821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:06.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.116:22-10.0.0.1:45840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:11.930052 systemd[1]: Started sshd@25-10.0.0.116:22-10.0.0.1:45846.service. May 10 00:47:11.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.116:22-10.0.0.1:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:11.931697 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:11.931756 kernel: audit: type=1130 audit(1746838031.929:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.116:22-10.0.0.1:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:12.002000 audit[4834]: USER_ACCT pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.003835 sshd[4834]: Accepted publickey for core from 10.0.0.1 port 45846 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:47:12.008330 sshd[4834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:12.029858 systemd-logind[1200]: New session 26 of user core. May 10 00:47:12.030513 systemd[1]: Started session-26.scope. May 10 00:47:12.030969 kernel: audit: type=1101 audit(1746838032.002:1511): pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.007000 audit[4834]: CRED_ACQ pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.038443 kernel: audit: type=1103 audit(1746838032.007:1512): pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.038502 kernel: audit: type=1006 audit(1746838032.007:1513): pid=4834 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:47:12.038526 kernel: audit: type=1300 audit(1746838032.007:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8cb30fa0 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:12.007000 audit[4834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8cb30fa0 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:12.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:12.052078 kernel: audit: type=1327 audit(1746838032.007:1513): proctitle=737368643A20636F7265205B707269765D May 10 00:47:12.052207 kernel: audit: type=1105 audit(1746838032.035:1514): pid=4834 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.035000 audit[4834]: USER_START pid=4834 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.036000 audit[4836]: CRED_ACQ pid=4836 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.059961 kernel: audit: type=1103 audit(1746838032.036:1515): pid=4836 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.146430 sshd[4834]: pam_unix(sshd:session): session closed for user core May 10 00:47:12.146000 audit[4834]: USER_END pid=4834 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.149358 systemd[1]: sshd@25-10.0.0.116:22-10.0.0.1:45846.service: Deactivated successfully. May 10 00:47:12.150250 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:47:12.146000 audit[4834]: CRED_DISP pid=4834 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.157239 kernel: audit: type=1106 audit(1746838032.146:1516): pid=4834 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.157323 kernel: audit: type=1104 audit(1746838032.146:1517): pid=4834 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:12.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.116:22-10.0.0.1:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:12.157927 systemd-logind[1200]: Session 26 logged out. Waiting for processes to exit. May 10 00:47:12.158851 systemd-logind[1200]: Removed session 26. May 10 00:47:12.652000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:12.652000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:12.652000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024c4150 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:47:12.652000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ff6480 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:47:12.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:12.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:14.219000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:14.219000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:14.219000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:14.219000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:14.219000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e93aae0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:47:14.219000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c010ef22a0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:47:14.219000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00c4035c0 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:47:14.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:14.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:14.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:14.219000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:14.219000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e6ae160 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:47:14.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:14.219000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00d464840 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:47:14.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:14.224000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:14.224000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010ef2330 a2=fc6 a3=0 items=0 ppid=1648 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c910 key=(null) May 10 00:47:14.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 10 00:47:17.152212 systemd[1]: Started sshd@26-10.0.0.116:22-10.0.0.1:47864.service. May 10 00:47:17.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.116:22-10.0.0.1:47864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:17.154253 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:47:17.164427 kernel: audit: type=1130 audit(1746838037.151:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.116:22-10.0.0.1:47864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:17.184000 audit[4847]: USER_ACCT pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.185658 sshd[4847]: Accepted publickey for core from 10.0.0.1 port 47864 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:47:17.189000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.191024 sshd[4847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:17.195006 kernel: audit: type=1101 audit(1746838037.184:1528): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.195156 kernel: audit: type=1103 audit(1746838037.189:1529): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.195193 kernel: audit: type=1006 audit(1746838037.189:1530): pid=4847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:47:17.195808 systemd-logind[1200]: New session 27 of user core. May 10 00:47:17.196888 systemd[1]: Started session-27.scope. May 10 00:47:17.189000 audit[4847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc242c5840 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:17.201858 kernel: audit: type=1300 audit(1746838037.189:1530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc242c5840 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:17.202006 kernel: audit: type=1327 audit(1746838037.189:1530): proctitle=737368643A20636F7265205B707269765D May 10 00:47:17.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:17.203000 audit[4847]: USER_START pid=4847 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.205000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.211836 kernel: audit: type=1105 audit(1746838037.203:1531): pid=4847 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.211894 kernel: audit: type=1103 audit(1746838037.205:1532): pid=4849 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.303743 sshd[4847]: pam_unix(sshd:session): session closed for user core May 10 00:47:17.303000 audit[4847]: USER_END pid=4847 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.305901 systemd[1]: sshd@26-10.0.0.116:22-10.0.0.1:47864.service: Deactivated successfully. May 10 00:47:17.306682 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:47:17.304000 audit[4847]: CRED_DISP pid=4847 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.310399 systemd-logind[1200]: Session 27 logged out. Waiting for processes to exit. May 10 00:47:17.311177 systemd-logind[1200]: Removed session 27. May 10 00:47:17.313011 kernel: audit: type=1106 audit(1746838037.303:1533): pid=4847 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.313080 kernel: audit: type=1104 audit(1746838037.304:1534): pid=4847 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:47:17.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.116:22-10.0.0.1:47864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:18.194000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:18.194000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed82c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:47:18.194000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:18.199000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:18.199000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030d6e60 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:47:18.199000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:18.201000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:18.201000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ff7120 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:47:18.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:18.202000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:18.202000 audit[1832]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030d6e80 a2=fc6 a3=0 items=0 ppid=1671 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c868 key=(null) May 10 00:47:18.202000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269