May 10 00:35:30.019800 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:35:30.019834 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:35:30.019863 kernel: BIOS-provided physical RAM map: May 10 00:35:30.019882 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:35:30.019889 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:35:30.019894 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:35:30.019904 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:35:30.019920 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:35:30.019931 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:35:30.019944 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:35:30.019957 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 10 00:35:30.019979 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:35:30.019999 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:35:30.020020 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:35:30.020041 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:35:30.020068 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:35:30.020087 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:35:30.020103 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:35:30.020143 kernel: NX (Execute Disable) protection: active May 10 00:35:30.020157 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:35:30.020178 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 10 00:35:30.020197 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:35:30.020208 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 10 00:35:30.020229 kernel: extended physical RAM map: May 10 00:35:30.020245 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:35:30.020276 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 10 00:35:30.020290 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 10 00:35:30.020302 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 10 00:35:30.020308 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 10 00:35:30.020319 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 10 00:35:30.020344 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 10 00:35:30.020351 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 10 00:35:30.020369 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 10 00:35:30.020388 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 10 00:35:30.020399 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 10 00:35:30.020415 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 10 00:35:30.020439 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 10 00:35:30.020459 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 10 00:35:30.020473 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 10 00:35:30.020479 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 10 00:35:30.020496 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 10 00:35:30.020514 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 10 00:35:30.020531 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:35:30.020545 kernel: efi: EFI v2.70 by EDK II May 10 00:35:30.020553 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 10 00:35:30.020560 kernel: random: crng init done May 10 00:35:30.020566 kernel: SMBIOS 2.8 present. May 10 00:35:30.020575 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 10 00:35:30.020582 kernel: Hypervisor detected: KVM May 10 00:35:30.020588 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:35:30.020594 kernel: kvm-clock: cpu 0, msr 4f196001, primary cpu clock May 10 00:35:30.020606 kernel: kvm-clock: using sched offset of 5206754814 cycles May 10 00:35:30.020621 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:35:30.020629 kernel: tsc: Detected 2794.748 MHz processor May 10 00:35:30.020636 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:35:30.020647 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:35:30.020654 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 10 00:35:30.020666 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:35:30.020679 kernel: Using GB pages for direct mapping May 10 00:35:30.020686 kernel: Secure boot disabled May 10 00:35:30.020693 kernel: ACPI: Early table checksum verification disabled May 10 00:35:30.020715 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 10 00:35:30.020740 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 10 00:35:30.020755 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:35:30.020771 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:35:30.020788 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 10 00:35:30.020795 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:35:30.020802 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:35:30.020811 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:35:30.020824 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:35:30.020852 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 10 00:35:30.020867 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 10 00:35:30.020881 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 10 00:35:30.020895 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 10 00:35:30.020902 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 10 00:35:30.020909 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 10 00:35:30.020915 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 10 00:35:30.020922 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 10 00:35:30.020928 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 10 00:35:30.020937 kernel: No NUMA configuration found May 10 00:35:30.020953 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 10 00:35:30.020973 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 10 00:35:30.020992 kernel: Zone ranges: May 10 00:35:30.021035 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:35:30.021042 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 10 00:35:30.021048 kernel: Normal empty May 10 00:35:30.021055 kernel: Movable zone start for each node May 10 00:35:30.021066 kernel: Early memory node ranges May 10 00:35:30.021094 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:35:30.021105 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 10 00:35:30.021122 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 10 00:35:30.021139 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 10 00:35:30.021153 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 10 00:35:30.021175 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 10 00:35:30.021194 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 10 00:35:30.021214 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:35:30.021226 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:35:30.021243 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 10 00:35:30.021289 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:35:30.021314 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 10 00:35:30.021344 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:35:30.021359 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 10 00:35:30.021381 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:35:30.021401 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:35:30.021423 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:35:30.021438 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:35:30.021457 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:35:30.021489 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:35:30.021505 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:35:30.021520 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:35:30.021539 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:35:30.021580 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:35:30.021600 kernel: TSC deadline timer available May 10 00:35:30.021620 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 10 00:35:30.021640 kernel: kvm-guest: KVM setup pv remote TLB flush May 10 00:35:30.021660 kernel: kvm-guest: setup PV sched yield May 10 00:35:30.021688 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 10 00:35:30.021707 kernel: Booting paravirtualized kernel on KVM May 10 00:35:30.021741 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:35:30.021764 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 10 00:35:30.021784 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 10 00:35:30.021801 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 10 00:35:30.021821 kernel: pcpu-alloc: [0] 0 1 2 3 May 10 00:35:30.021841 kernel: kvm-guest: setup async PF for cpu 0 May 10 00:35:30.021858 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 10 00:35:30.021876 kernel: kvm-guest: PV spinlocks enabled May 10 00:35:30.021893 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:35:30.021913 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 10 00:35:30.021939 kernel: Policy zone: DMA32 May 10 00:35:30.021958 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:35:30.021976 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:35:30.021998 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:35:30.022022 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:35:30.022041 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:35:30.022057 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 10 00:35:30.022066 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 10 00:35:30.022077 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:35:30.022092 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:35:30.022102 kernel: rcu: Hierarchical RCU implementation. May 10 00:35:30.022109 kernel: rcu: RCU event tracing is enabled. May 10 00:35:30.022119 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 10 00:35:30.022126 kernel: Rude variant of Tasks RCU enabled. May 10 00:35:30.022143 kernel: Tracing variant of Tasks RCU enabled. May 10 00:35:30.022166 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:35:30.022186 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 10 00:35:30.022198 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 10 00:35:30.022207 kernel: Console: colour dummy device 80x25 May 10 00:35:30.022214 kernel: printk: console [ttyS0] enabled May 10 00:35:30.022229 kernel: ACPI: Core revision 20210730 May 10 00:35:30.022246 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:35:30.022256 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:35:30.022293 kernel: x2apic enabled May 10 00:35:30.022310 kernel: Switched APIC routing to physical x2apic. May 10 00:35:30.022337 kernel: kvm-guest: setup PV IPIs May 10 00:35:30.022356 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:35:30.022369 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 00:35:30.022376 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 10 00:35:30.022388 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 00:35:30.022404 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 10 00:35:30.022431 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 10 00:35:30.022451 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:35:30.022475 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:35:30.022493 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:35:30.022514 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 10 00:35:30.022532 kernel: RETBleed: Mitigation: untrained return thunk May 10 00:35:30.022551 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:35:30.022571 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:35:30.022597 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:35:30.022609 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:35:30.022620 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:35:30.022642 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:35:30.022660 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:35:30.022668 kernel: Freeing SMP alternatives memory: 32K May 10 00:35:30.022677 kernel: pid_max: default: 32768 minimum: 301 May 10 00:35:30.022684 kernel: LSM: Security Framework initializing May 10 00:35:30.022691 kernel: SELinux: Initializing. May 10 00:35:30.022702 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:35:30.022712 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:35:30.022719 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 10 00:35:30.022728 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 10 00:35:30.022735 kernel: ... version: 0 May 10 00:35:30.022742 kernel: ... bit width: 48 May 10 00:35:30.022749 kernel: ... generic registers: 6 May 10 00:35:30.022756 kernel: ... value mask: 0000ffffffffffff May 10 00:35:30.022770 kernel: ... max period: 00007fffffffffff May 10 00:35:30.022777 kernel: ... fixed-purpose events: 0 May 10 00:35:30.022786 kernel: ... event mask: 000000000000003f May 10 00:35:30.022793 kernel: signal: max sigframe size: 1776 May 10 00:35:30.022800 kernel: rcu: Hierarchical SRCU implementation. May 10 00:35:30.022806 kernel: smp: Bringing up secondary CPUs ... May 10 00:35:30.022813 kernel: x86: Booting SMP configuration: May 10 00:35:30.022820 kernel: .... node #0, CPUs: #1 May 10 00:35:30.022827 kernel: kvm-clock: cpu 1, msr 4f196041, secondary cpu clock May 10 00:35:30.022834 kernel: kvm-guest: setup async PF for cpu 1 May 10 00:35:30.022840 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 10 00:35:30.022849 kernel: #2 May 10 00:35:30.022856 kernel: kvm-clock: cpu 2, msr 4f196081, secondary cpu clock May 10 00:35:30.022863 kernel: kvm-guest: setup async PF for cpu 2 May 10 00:35:30.022869 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 10 00:35:30.022876 kernel: #3 May 10 00:35:30.022883 kernel: kvm-clock: cpu 3, msr 4f1960c1, secondary cpu clock May 10 00:35:30.022889 kernel: kvm-guest: setup async PF for cpu 3 May 10 00:35:30.022896 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 10 00:35:30.022903 kernel: smp: Brought up 1 node, 4 CPUs May 10 00:35:30.022914 kernel: smpboot: Max logical packages: 1 May 10 00:35:30.022921 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 10 00:35:30.022928 kernel: devtmpfs: initialized May 10 00:35:30.022935 kernel: x86/mm: Memory block size: 128MB May 10 00:35:30.022942 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 10 00:35:30.022949 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 10 00:35:30.022956 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 10 00:35:30.022963 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 10 00:35:30.022970 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 10 00:35:30.022978 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:35:30.022986 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 10 00:35:30.022993 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:35:30.023000 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:35:30.023006 kernel: audit: initializing netlink subsys (disabled) May 10 00:35:30.023013 kernel: audit: type=2000 audit(1746837329.504:1): state=initialized audit_enabled=0 res=1 May 10 00:35:30.023033 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:35:30.023049 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:35:30.023057 kernel: cpuidle: using governor menu May 10 00:35:30.023066 kernel: ACPI: bus type PCI registered May 10 00:35:30.023073 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:35:30.023079 kernel: dca service started, version 1.12.1 May 10 00:35:30.023087 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 00:35:30.023093 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 00:35:30.023100 kernel: PCI: Using configuration type 1 for base access May 10 00:35:30.023108 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:35:30.023115 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:35:30.023132 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:35:30.023155 kernel: ACPI: Added _OSI(Module Device) May 10 00:35:30.023176 kernel: ACPI: Added _OSI(Processor Device) May 10 00:35:30.024216 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:35:30.024226 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:35:30.024233 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:35:30.024249 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:35:30.027842 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:35:30.027860 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:35:30.027875 kernel: ACPI: Interpreter enabled May 10 00:35:30.027886 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:35:30.027893 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:35:30.027901 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:35:30.027908 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 00:35:30.027915 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:35:30.028340 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:35:30.028477 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 10 00:35:30.028581 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 10 00:35:30.028595 kernel: PCI host bridge to bus 0000:00 May 10 00:35:30.028807 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:35:30.029998 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:35:30.030218 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:35:30.030431 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 10 00:35:30.030608 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:35:30.030867 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 10 00:35:30.031060 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:35:30.031355 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 00:35:30.036372 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 10 00:35:30.036566 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 10 00:35:30.036806 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 10 00:35:30.036895 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:35:30.036996 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 10 00:35:30.037097 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:35:30.037194 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:35:30.037312 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 10 00:35:30.037399 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 10 00:35:30.037472 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 10 00:35:30.037577 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 10 00:35:30.037671 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 10 00:35:30.037746 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 10 00:35:30.037820 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 10 00:35:30.037989 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:35:30.038068 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 10 00:35:30.038142 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 10 00:35:30.038224 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 10 00:35:30.038322 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 10 00:35:30.038423 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 00:35:30.038550 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 00:35:30.038693 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 00:35:30.038802 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 10 00:35:30.038900 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 10 00:35:30.039065 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 00:35:30.039187 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 10 00:35:30.039207 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:35:30.039220 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:35:30.039227 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:35:30.039234 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:35:30.039241 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 00:35:30.039248 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 00:35:30.039258 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 00:35:30.039278 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 00:35:30.039285 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 00:35:30.039301 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 00:35:30.039308 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 00:35:30.039315 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 00:35:30.039322 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 00:35:30.039335 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 00:35:30.039342 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 00:35:30.039353 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 00:35:30.039360 kernel: iommu: Default domain type: Translated May 10 00:35:30.039367 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:35:30.039452 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 00:35:30.039536 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:35:30.039629 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 00:35:30.039640 kernel: vgaarb: loaded May 10 00:35:30.039647 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:35:30.039654 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:35:30.039664 kernel: PTP clock support registered May 10 00:35:30.039681 kernel: Registered efivars operations May 10 00:35:30.039697 kernel: PCI: Using ACPI for IRQ routing May 10 00:35:30.039716 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:35:30.039728 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 10 00:35:30.039735 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 10 00:35:30.039742 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 10 00:35:30.039758 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 10 00:35:30.039776 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 10 00:35:30.039797 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 10 00:35:30.039814 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:35:30.039822 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:35:30.039829 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:35:30.039852 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:35:30.039860 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:35:30.039866 kernel: pnp: PnP ACPI init May 10 00:35:30.039997 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 00:35:30.040012 kernel: pnp: PnP ACPI: found 6 devices May 10 00:35:30.040019 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:35:30.040026 kernel: NET: Registered PF_INET protocol family May 10 00:35:30.040033 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:35:30.040055 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 00:35:30.040063 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:35:30.040070 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:35:30.040077 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 00:35:30.040084 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 00:35:30.040094 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:35:30.040100 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:35:30.040108 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:35:30.040118 kernel: NET: Registered PF_XDP protocol family May 10 00:35:30.040229 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 10 00:35:30.040404 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 10 00:35:30.040552 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:35:30.040684 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:35:30.040830 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:35:30.040929 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 10 00:35:30.041000 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 00:35:30.041077 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 10 00:35:30.041088 kernel: PCI: CLS 0 bytes, default 64 May 10 00:35:30.041095 kernel: Initialise system trusted keyrings May 10 00:35:30.041107 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 00:35:30.041114 kernel: Key type asymmetric registered May 10 00:35:30.041121 kernel: Asymmetric key parser 'x509' registered May 10 00:35:30.041131 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:35:30.041138 kernel: io scheduler mq-deadline registered May 10 00:35:30.041172 kernel: io scheduler kyber registered May 10 00:35:30.041182 kernel: io scheduler bfq registered May 10 00:35:30.041190 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:35:30.041208 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 00:35:30.041218 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 00:35:30.041242 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 00:35:30.041254 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:35:30.041341 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:35:30.041349 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:35:30.041357 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:35:30.041364 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:35:30.041490 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 00:35:30.041516 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:35:30.041630 kernel: rtc_cmos 00:04: registered as rtc0 May 10 00:35:30.041699 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T00:35:29 UTC (1746837329) May 10 00:35:30.041815 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 10 00:35:30.041829 kernel: efifb: probing for efifb May 10 00:35:30.041838 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 10 00:35:30.041853 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 10 00:35:30.041861 kernel: efifb: scrolling: redraw May 10 00:35:30.041868 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:35:30.041875 kernel: Console: switching to colour frame buffer device 160x50 May 10 00:35:30.041883 kernel: fb0: EFI VGA frame buffer device May 10 00:35:30.041890 kernel: pstore: Registered efi as persistent store backend May 10 00:35:30.041900 kernel: NET: Registered PF_INET6 protocol family May 10 00:35:30.041908 kernel: Segment Routing with IPv6 May 10 00:35:30.041920 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:35:30.041942 kernel: NET: Registered PF_PACKET protocol family May 10 00:35:30.041949 kernel: Key type dns_resolver registered May 10 00:35:30.041958 kernel: IPI shorthand broadcast: enabled May 10 00:35:30.041966 kernel: sched_clock: Marking stable (588520298, 141451185)->(763036809, -33065326) May 10 00:35:30.041973 kernel: registered taskstats version 1 May 10 00:35:30.041980 kernel: Loading compiled-in X.509 certificates May 10 00:35:30.041995 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:35:30.042003 kernel: Key type .fscrypt registered May 10 00:35:30.042017 kernel: Key type fscrypt-provisioning registered May 10 00:35:30.042035 kernel: pstore: Using crash dump compression: deflate May 10 00:35:30.042045 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:35:30.042055 kernel: ima: Allocated hash algorithm: sha1 May 10 00:35:30.042062 kernel: ima: No architecture policies found May 10 00:35:30.042069 kernel: clk: Disabling unused clocks May 10 00:35:30.042077 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:35:30.042084 kernel: Write protecting the kernel read-only data: 28672k May 10 00:35:30.042092 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:35:30.042107 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:35:30.042122 kernel: Run /init as init process May 10 00:35:30.042138 kernel: with arguments: May 10 00:35:30.042151 kernel: /init May 10 00:35:30.042158 kernel: with environment: May 10 00:35:30.042165 kernel: HOME=/ May 10 00:35:30.042172 kernel: TERM=linux May 10 00:35:30.042182 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:35:30.042202 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:35:30.042225 systemd[1]: Detected virtualization kvm. May 10 00:35:30.042241 systemd[1]: Detected architecture x86-64. May 10 00:35:30.042282 systemd[1]: Running in initrd. May 10 00:35:30.042301 systemd[1]: No hostname configured, using default hostname. May 10 00:35:30.042329 systemd[1]: Hostname set to . May 10 00:35:30.042347 systemd[1]: Initializing machine ID from VM UUID. May 10 00:35:30.042366 systemd[1]: Queued start job for default target initrd.target. May 10 00:35:30.042387 systemd[1]: Started systemd-ask-password-console.path. May 10 00:35:30.042408 systemd[1]: Reached target cryptsetup.target. May 10 00:35:30.042427 systemd[1]: Reached target paths.target. May 10 00:35:30.042438 systemd[1]: Reached target slices.target. May 10 00:35:30.042445 systemd[1]: Reached target swap.target. May 10 00:35:30.042453 systemd[1]: Reached target timers.target. May 10 00:35:30.042461 systemd[1]: Listening on iscsid.socket. May 10 00:35:30.042468 systemd[1]: Listening on iscsiuio.socket. May 10 00:35:30.042476 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:35:30.042491 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:35:30.042512 systemd[1]: Listening on systemd-journald.socket. May 10 00:35:30.042537 systemd[1]: Listening on systemd-networkd.socket. May 10 00:35:30.042561 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:35:30.042571 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:35:30.042579 systemd[1]: Reached target sockets.target. May 10 00:35:30.042587 systemd[1]: Starting kmod-static-nodes.service... May 10 00:35:30.042595 systemd[1]: Finished network-cleanup.service. May 10 00:35:30.042602 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:35:30.042610 systemd[1]: Starting systemd-journald.service... May 10 00:35:30.042618 systemd[1]: Starting systemd-modules-load.service... May 10 00:35:30.042635 systemd[1]: Starting systemd-resolved.service... May 10 00:35:30.042643 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:35:30.042661 systemd[1]: Finished kmod-static-nodes.service. May 10 00:35:30.042673 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:35:30.042681 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:35:30.042689 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:35:30.042697 kernel: audit: type=1130 audit(1746837330.023:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.042705 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:35:30.042714 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:35:30.042722 kernel: audit: type=1130 audit(1746837330.031:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.042739 systemd-journald[198]: Journal started May 10 00:35:30.042784 systemd-journald[198]: Runtime Journal (/run/log/journal/d35c206b207d4a79a3116115cd99e3c8) is 6.0M, max 48.4M, 42.4M free. May 10 00:35:30.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.029865 systemd-modules-load[199]: Inserted module 'overlay' May 10 00:35:30.044299 systemd[1]: Started systemd-journald.service. May 10 00:35:30.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.048283 kernel: audit: type=1130 audit(1746837330.044:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.054407 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:35:30.056112 systemd-resolved[200]: Positive Trust Anchors: May 10 00:35:30.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.056131 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:35:30.062317 kernel: audit: type=1130 audit(1746837330.056:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.056169 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:35:30.071840 kernel: audit: type=1130 audit(1746837330.062:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.057234 systemd[1]: Starting dracut-cmdline.service... May 10 00:35:30.073468 dracut-cmdline[215]: dracut-dracut-053 May 10 00:35:30.073468 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:35:30.058768 systemd-resolved[200]: Defaulting to hostname 'linux'. May 10 00:35:30.060908 systemd[1]: Started systemd-resolved.service. May 10 00:35:30.063293 systemd[1]: Reached target nss-lookup.target. May 10 00:35:30.094297 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:35:30.099198 systemd-modules-load[199]: Inserted module 'br_netfilter' May 10 00:35:30.100216 kernel: Bridge firewalling registered May 10 00:35:30.116300 kernel: SCSI subsystem initialized May 10 00:35:30.128738 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:35:30.128817 kernel: device-mapper: uevent: version 1.0.3 May 10 00:35:30.128831 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:35:30.133607 systemd-modules-load[199]: Inserted module 'dm_multipath' May 10 00:35:30.134387 systemd[1]: Finished systemd-modules-load.service. May 10 00:35:30.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.139295 kernel: audit: type=1130 audit(1746837330.134:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.135476 systemd[1]: Starting systemd-sysctl.service... May 10 00:35:30.145290 kernel: Loading iSCSI transport class v2.0-870. May 10 00:35:30.147588 systemd[1]: Finished systemd-sysctl.service. May 10 00:35:30.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.152283 kernel: audit: type=1130 audit(1746837330.148:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.163334 kernel: iscsi: registered transport (tcp) May 10 00:35:30.186592 kernel: iscsi: registered transport (qla4xxx) May 10 00:35:30.186647 kernel: QLogic iSCSI HBA Driver May 10 00:35:30.211815 systemd[1]: Finished dracut-cmdline.service. May 10 00:35:30.217632 kernel: audit: type=1130 audit(1746837330.212:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.213629 systemd[1]: Starting dracut-pre-udev.service... May 10 00:35:30.263340 kernel: raid6: avx2x4 gen() 22272 MB/s May 10 00:35:30.280304 kernel: raid6: avx2x4 xor() 6566 MB/s May 10 00:35:30.297297 kernel: raid6: avx2x2 gen() 30020 MB/s May 10 00:35:30.314292 kernel: raid6: avx2x2 xor() 17833 MB/s May 10 00:35:30.331293 kernel: raid6: avx2x1 gen() 24326 MB/s May 10 00:35:30.348307 kernel: raid6: avx2x1 xor() 14848 MB/s May 10 00:35:30.365306 kernel: raid6: sse2x4 gen() 14405 MB/s May 10 00:35:30.382336 kernel: raid6: sse2x4 xor() 5156 MB/s May 10 00:35:30.399352 kernel: raid6: sse2x2 gen() 14178 MB/s May 10 00:35:30.416336 kernel: raid6: sse2x2 xor() 7619 MB/s May 10 00:35:30.433310 kernel: raid6: sse2x1 gen() 11099 MB/s May 10 00:35:30.450719 kernel: raid6: sse2x1 xor() 7683 MB/s May 10 00:35:30.450763 kernel: raid6: using algorithm avx2x2 gen() 30020 MB/s May 10 00:35:30.450776 kernel: raid6: .... xor() 17833 MB/s, rmw enabled May 10 00:35:30.451462 kernel: raid6: using avx2x2 recovery algorithm May 10 00:35:30.465353 kernel: xor: automatically using best checksumming function avx May 10 00:35:30.568309 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:35:30.577748 systemd[1]: Finished dracut-pre-udev.service. May 10 00:35:30.582509 kernel: audit: type=1130 audit(1746837330.578:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.582000 audit: BPF prog-id=7 op=LOAD May 10 00:35:30.582000 audit: BPF prog-id=8 op=LOAD May 10 00:35:30.582856 systemd[1]: Starting systemd-udevd.service... May 10 00:35:30.599112 systemd-udevd[398]: Using default interface naming scheme 'v252'. May 10 00:35:30.603321 systemd[1]: Started systemd-udevd.service. May 10 00:35:30.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.605416 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:35:30.615716 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 10 00:35:30.644116 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:35:30.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.645243 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:35:30.681172 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:35:30.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:30.724565 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 10 00:35:30.748319 kernel: libata version 3.00 loaded. May 10 00:35:30.748336 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:35:30.748346 kernel: GPT:9289727 != 19775487 May 10 00:35:30.748354 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:35:30.748363 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:35:30.748373 kernel: GPT:9289727 != 19775487 May 10 00:35:30.748381 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:35:30.748390 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:35:30.758699 kernel: ahci 0000:00:1f.2: version 3.0 May 10 00:35:30.785223 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 00:35:30.785242 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 00:35:30.785372 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 00:35:30.785463 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:35:30.785475 kernel: AES CTR mode by8 optimization enabled May 10 00:35:30.785485 kernel: scsi host0: ahci May 10 00:35:30.785597 kernel: scsi host1: ahci May 10 00:35:30.785699 kernel: scsi host2: ahci May 10 00:35:30.785795 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) May 10 00:35:30.785807 kernel: scsi host3: ahci May 10 00:35:30.785905 kernel: scsi host4: ahci May 10 00:35:30.786002 kernel: scsi host5: ahci May 10 00:35:30.786105 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 10 00:35:30.786117 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 10 00:35:30.786130 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 10 00:35:30.786140 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 10 00:35:30.786150 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 10 00:35:30.786160 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 10 00:35:30.774818 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:35:30.787572 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:35:30.788795 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:35:30.797190 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:35:30.801154 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:35:30.802089 systemd[1]: Starting disk-uuid.service... May 10 00:35:30.811112 disk-uuid[530]: Primary Header is updated. May 10 00:35:30.811112 disk-uuid[530]: Secondary Entries is updated. May 10 00:35:30.811112 disk-uuid[530]: Secondary Header is updated. May 10 00:35:30.815659 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:35:30.817299 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:35:31.097150 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 00:35:31.097220 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 00:35:31.097292 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 00:35:31.098312 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 10 00:35:31.100306 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 00:35:31.100327 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 10 00:35:31.101718 kernel: ata3.00: applying bridge limits May 10 00:35:31.102417 kernel: ata3.00: configured for UDMA/100 May 10 00:35:31.103294 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 10 00:35:31.106309 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 00:35:31.138448 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 10 00:35:31.156012 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:35:31.156031 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:35:31.818387 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:35:31.818452 disk-uuid[536]: The operation has completed successfully. May 10 00:35:31.841189 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:35:31.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:31.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:31.841304 systemd[1]: Finished disk-uuid.service. May 10 00:35:31.850456 systemd[1]: Starting verity-setup.service... May 10 00:35:31.863302 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 10 00:35:31.881111 systemd[1]: Found device dev-mapper-usr.device. May 10 00:35:31.883652 systemd[1]: Mounting sysusr-usr.mount... May 10 00:35:31.887451 systemd[1]: Finished verity-setup.service. May 10 00:35:31.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:31.945308 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:35:31.945420 systemd[1]: Mounted sysusr-usr.mount. May 10 00:35:31.947113 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:35:31.949599 systemd[1]: Starting ignition-setup.service... May 10 00:35:31.951970 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:35:31.959397 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:35:31.959431 kernel: BTRFS info (device vda6): using free space tree May 10 00:35:31.959441 kernel: BTRFS info (device vda6): has skinny extents May 10 00:35:31.968600 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:35:31.976882 systemd[1]: Finished ignition-setup.service. May 10 00:35:31.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:31.979472 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:35:32.016427 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:35:32.018435 ignition[657]: Ignition 2.14.0 May 10 00:35:32.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.018444 ignition[657]: Stage: fetch-offline May 10 00:35:32.018485 ignition[657]: no configs at "/usr/lib/ignition/base.d" May 10 00:35:32.018494 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:35:32.018620 ignition[657]: parsed url from cmdline: "" May 10 00:35:32.018624 ignition[657]: no config URL provided May 10 00:35:32.018630 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:35:32.018639 ignition[657]: no config at "/usr/lib/ignition/user.ign" May 10 00:35:32.018662 ignition[657]: op(1): [started] loading QEMU firmware config module May 10 00:35:32.018667 ignition[657]: op(1): executing: "modprobe" "qemu_fw_cfg" May 10 00:35:32.023000 ignition[657]: op(1): [finished] loading QEMU firmware config module May 10 00:35:32.027000 audit: BPF prog-id=9 op=LOAD May 10 00:35:32.028415 systemd[1]: Starting systemd-networkd.service... May 10 00:35:32.066554 ignition[657]: parsing config with SHA512: 06db608cb88d7f2ee9dacfbb3c1cd2bf2be242206fe737e7a2652cb57e8f13627fdffd093007e1770dead722fb4a911fba96d81607f77a4a81bc2d890098e3c7 May 10 00:35:32.073011 unknown[657]: fetched base config from "system" May 10 00:35:32.073039 unknown[657]: fetched user config from "qemu" May 10 00:35:32.075121 ignition[657]: fetch-offline: fetch-offline passed May 10 00:35:32.076214 ignition[657]: Ignition finished successfully May 10 00:35:32.077421 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:35:32.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.085406 systemd-networkd[728]: lo: Link UP May 10 00:35:32.085414 systemd-networkd[728]: lo: Gained carrier May 10 00:35:32.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.085836 systemd-networkd[728]: Enumeration completed May 10 00:35:32.085949 systemd[1]: Started systemd-networkd.service. May 10 00:35:32.086040 systemd-networkd[728]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:35:32.087249 systemd-networkd[728]: eth0: Link UP May 10 00:35:32.087252 systemd-networkd[728]: eth0: Gained carrier May 10 00:35:32.087587 systemd[1]: Reached target network.target. May 10 00:35:32.089050 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:35:32.089795 systemd[1]: Starting ignition-kargs.service... May 10 00:35:32.090690 systemd[1]: Starting iscsiuio.service... May 10 00:35:32.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.095417 systemd[1]: Started iscsiuio.service. May 10 00:35:32.099341 systemd[1]: Starting iscsid.service... May 10 00:35:32.102207 ignition[730]: Ignition 2.14.0 May 10 00:35:32.102223 ignition[730]: Stage: kargs May 10 00:35:32.103833 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:35:32.103833 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:35:32.103833 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:35:32.103833 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:35:32.103833 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:35:32.103833 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:35:32.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.102376 ignition[730]: no configs at "/usr/lib/ignition/base.d" May 10 00:35:32.103442 systemd[1]: Started iscsid.service. May 10 00:35:32.102391 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:35:32.106132 systemd[1]: Starting dracut-initqueue.service... May 10 00:35:32.104143 ignition[730]: kargs: kargs passed May 10 00:35:32.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.115167 systemd[1]: Finished dracut-initqueue.service. May 10 00:35:32.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.104187 ignition[730]: Ignition finished successfully May 10 00:35:32.115555 systemd[1]: Reached target remote-fs-pre.target. May 10 00:35:32.133578 ignition[749]: Ignition 2.14.0 May 10 00:35:32.118297 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:35:32.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.133585 ignition[749]: Stage: disks May 10 00:35:32.119954 systemd[1]: Reached target remote-fs.target. May 10 00:35:32.133693 ignition[749]: no configs at "/usr/lib/ignition/base.d" May 10 00:35:32.121987 systemd[1]: Starting dracut-pre-mount.service... May 10 00:35:32.133703 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:35:32.123255 systemd[1]: Finished ignition-kargs.service. May 10 00:35:32.134920 ignition[749]: disks: disks passed May 10 00:35:32.125530 systemd-networkd[728]: eth0: DHCPv4 address 10.0.0.17/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:35:32.134962 ignition[749]: Ignition finished successfully May 10 00:35:32.125544 systemd[1]: Starting ignition-disks.service... May 10 00:35:32.131543 systemd[1]: Finished dracut-pre-mount.service. May 10 00:35:32.135542 systemd[1]: Finished ignition-disks.service. May 10 00:35:32.136659 systemd[1]: Reached target initrd-root-device.target. May 10 00:35:32.155135 systemd-fsck[761]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:35:32.138376 systemd[1]: Reached target local-fs-pre.target. May 10 00:35:32.139212 systemd[1]: Reached target local-fs.target. May 10 00:35:32.140055 systemd[1]: Reached target sysinit.target. May 10 00:35:32.140928 systemd[1]: Reached target basic.target. May 10 00:35:32.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.142465 systemd[1]: Starting systemd-fsck-root.service... May 10 00:35:32.159565 systemd[1]: Finished systemd-fsck-root.service. May 10 00:35:32.162690 systemd[1]: Mounting sysroot.mount... May 10 00:35:32.169286 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:35:32.169698 systemd[1]: Mounted sysroot.mount. May 10 00:35:32.170487 systemd[1]: Reached target initrd-root-fs.target. May 10 00:35:32.172802 systemd[1]: Mounting sysroot-usr.mount... May 10 00:35:32.173792 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:35:32.173820 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:35:32.173838 systemd[1]: Reached target ignition-diskful.target. May 10 00:35:32.175886 systemd[1]: Mounted sysroot-usr.mount. May 10 00:35:32.177893 systemd[1]: Starting initrd-setup-root.service... May 10 00:35:32.182768 initrd-setup-root[771]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:35:32.185134 initrd-setup-root[779]: cut: /sysroot/etc/group: No such file or directory May 10 00:35:32.188990 initrd-setup-root[787]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:35:32.192729 initrd-setup-root[795]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:35:32.217799 systemd[1]: Finished initrd-setup-root.service. May 10 00:35:32.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.219731 systemd[1]: Starting ignition-mount.service... May 10 00:35:32.221838 systemd[1]: Starting sysroot-boot.service... May 10 00:35:32.224671 bash[812]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:35:32.232887 ignition[814]: INFO : Ignition 2.14.0 May 10 00:35:32.232887 ignition[814]: INFO : Stage: mount May 10 00:35:32.234659 ignition[814]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:35:32.234659 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:35:32.234659 ignition[814]: INFO : mount: mount passed May 10 00:35:32.234659 ignition[814]: INFO : Ignition finished successfully May 10 00:35:32.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.235505 systemd[1]: Finished ignition-mount.service. May 10 00:35:32.243879 systemd[1]: Finished sysroot-boot.service. May 10 00:35:32.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:32.892560 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:35:32.898309 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (823) May 10 00:35:32.900461 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:35:32.900476 kernel: BTRFS info (device vda6): using free space tree May 10 00:35:32.900487 kernel: BTRFS info (device vda6): has skinny extents May 10 00:35:32.904343 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:35:32.906622 systemd[1]: Starting ignition-files.service... May 10 00:35:32.920851 ignition[843]: INFO : Ignition 2.14.0 May 10 00:35:32.920851 ignition[843]: INFO : Stage: files May 10 00:35:32.922517 ignition[843]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:35:32.922517 ignition[843]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:35:32.922517 ignition[843]: DEBUG : files: compiled without relabeling support, skipping May 10 00:35:32.926331 ignition[843]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:35:32.926331 ignition[843]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:35:32.929326 ignition[843]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:35:32.929326 ignition[843]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:35:32.929326 ignition[843]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:35:32.929243 unknown[843]: wrote ssh authorized keys file for user: core May 10 00:35:32.934681 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:35:32.934681 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 10 00:35:33.016607 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:35:33.139531 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:35:33.141735 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 10 00:35:33.241401 systemd-networkd[728]: eth0: Gained IPv6LL May 10 00:35:33.625410 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:35:33.930762 ignition[843]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:35:33.930762 ignition[843]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:35:33.935123 ignition[843]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:35:33.958409 ignition[843]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:35:33.960122 ignition[843]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:35:33.960122 ignition[843]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 10 00:35:33.960122 ignition[843]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:35:33.964406 ignition[843]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:35:33.966197 ignition[843]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:35:33.967949 ignition[843]: INFO : files: files passed May 10 00:35:33.968726 ignition[843]: INFO : Ignition finished successfully May 10 00:35:33.970670 systemd[1]: Finished ignition-files.service. May 10 00:35:33.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:33.972814 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:35:33.974711 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:35:33.975349 systemd[1]: Starting ignition-quench.service... May 10 00:35:33.978463 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:35:33.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:33.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:33.978556 systemd[1]: Finished ignition-quench.service. May 10 00:35:33.985682 initrd-setup-root-after-ignition[869]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 10 00:35:33.988506 initrd-setup-root-after-ignition[871]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:35:33.990512 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:35:33.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:33.990655 systemd[1]: Reached target ignition-complete.target. May 10 00:35:33.994318 systemd[1]: Starting initrd-parse-etc.service... May 10 00:35:34.008582 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:35:34.008688 systemd[1]: Finished initrd-parse-etc.service. May 10 00:35:34.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.010556 systemd[1]: Reached target initrd-fs.target. May 10 00:35:34.012012 systemd[1]: Reached target initrd.target. May 10 00:35:34.013539 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:35:34.014341 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:35:34.026587 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:35:34.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.028241 systemd[1]: Starting initrd-cleanup.service... May 10 00:35:34.037364 systemd[1]: Stopped target nss-lookup.target. May 10 00:35:34.038325 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:35:34.039931 systemd[1]: Stopped target timers.target. May 10 00:35:34.041527 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:35:34.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.041613 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:35:34.043110 systemd[1]: Stopped target initrd.target. May 10 00:35:34.044716 systemd[1]: Stopped target basic.target. May 10 00:35:34.046223 systemd[1]: Stopped target ignition-complete.target. May 10 00:35:34.047805 systemd[1]: Stopped target ignition-diskful.target. May 10 00:35:34.049394 systemd[1]: Stopped target initrd-root-device.target. May 10 00:35:34.051094 systemd[1]: Stopped target remote-fs.target. May 10 00:35:34.052702 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:35:34.054394 systemd[1]: Stopped target sysinit.target. May 10 00:35:34.055899 systemd[1]: Stopped target local-fs.target. May 10 00:35:34.057480 systemd[1]: Stopped target local-fs-pre.target. May 10 00:35:34.059180 systemd[1]: Stopped target swap.target. May 10 00:35:34.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.060631 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:35:34.060717 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:35:34.069745 kernel: kauditd_printk_skb: 32 callbacks suppressed May 10 00:35:34.069768 kernel: audit: type=1131 audit(1746837334.065:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.062321 systemd[1]: Stopped target cryptsetup.target. May 10 00:35:34.074259 kernel: audit: type=1131 audit(1746837334.070:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.063700 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:35:34.063783 systemd[1]: Stopped dracut-initqueue.service. May 10 00:35:34.065502 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:35:34.065591 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:35:34.070728 systemd[1]: Stopped target paths.target. May 10 00:35:34.075037 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:35:34.078303 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:35:34.079530 systemd[1]: Stopped target slices.target. May 10 00:35:34.080965 systemd[1]: Stopped target sockets.target. May 10 00:35:34.082126 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:35:34.092296 kernel: audit: type=1131 audit(1746837334.087:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.082225 systemd[1]: Closed iscsid.socket. May 10 00:35:34.096783 kernel: audit: type=1131 audit(1746837334.092:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.084305 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:35:34.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.103640 ignition[884]: INFO : Ignition 2.14.0 May 10 00:35:34.103640 ignition[884]: INFO : Stage: umount May 10 00:35:34.103640 ignition[884]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:35:34.103640 ignition[884]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:35:34.124795 kernel: audit: type=1131 audit(1746837334.098:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.124824 kernel: audit: type=1131 audit(1746837334.099:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.124836 kernel: audit: type=1130 audit(1746837334.107:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.124846 kernel: audit: type=1131 audit(1746837334.107:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.124857 kernel: audit: type=1131 audit(1746837334.114:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.124867 kernel: audit: type=1131 audit(1746837334.119:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.084395 systemd[1]: Closed iscsiuio.socket. May 10 00:35:34.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.126562 ignition[884]: INFO : umount: umount passed May 10 00:35:34.126562 ignition[884]: INFO : Ignition finished successfully May 10 00:35:34.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.085914 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:35:34.086024 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:35:34.087696 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:35:34.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.087802 systemd[1]: Stopped ignition-files.service. May 10 00:35:34.093127 systemd[1]: Stopping ignition-mount.service... May 10 00:35:34.097626 systemd[1]: Stopping sysroot-boot.service... May 10 00:35:34.098382 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:35:34.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.098599 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:35:34.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.099056 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:35:34.099207 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:35:34.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.102452 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:35:34.102524 systemd[1]: Finished initrd-cleanup.service. May 10 00:35:34.108150 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:35:34.108244 systemd[1]: Stopped ignition-mount.service. May 10 00:35:34.114654 systemd[1]: Stopped target network.target. May 10 00:35:34.117790 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:35:34.117833 systemd[1]: Stopped ignition-disks.service. May 10 00:35:34.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.119872 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:35:34.119915 systemd[1]: Stopped ignition-kargs.service. May 10 00:35:34.125772 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:35:34.125810 systemd[1]: Stopped ignition-setup.service. May 10 00:35:34.127551 systemd[1]: Stopping systemd-networkd.service... May 10 00:35:34.160000 audit: BPF prog-id=6 op=UNLOAD May 10 00:35:34.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.128555 systemd[1]: Stopping systemd-resolved.service... May 10 00:35:34.131302 systemd-networkd[728]: eth0: DHCPv6 lease lost May 10 00:35:34.163000 audit: BPF prog-id=9 op=UNLOAD May 10 00:35:34.132729 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:35:34.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.132827 systemd[1]: Stopped systemd-networkd.service. May 10 00:35:34.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.134861 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:35:34.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.134895 systemd[1]: Closed systemd-networkd.socket. May 10 00:35:34.137505 systemd[1]: Stopping network-cleanup.service... May 10 00:35:34.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.139526 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:35:34.139579 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:35:34.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.141187 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:35:34.141222 systemd[1]: Stopped systemd-sysctl.service. May 10 00:35:34.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.144311 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:35:34.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.144361 systemd[1]: Stopped systemd-modules-load.service. May 10 00:35:34.151323 systemd[1]: Stopping systemd-udevd.service... May 10 00:35:34.152962 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:35:34.153409 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:35:34.153501 systemd[1]: Stopped systemd-resolved.service. May 10 00:35:34.159301 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:35:34.159433 systemd[1]: Stopped systemd-udevd.service. May 10 00:35:34.160905 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:35:34.160938 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:35:34.162734 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:35:34.162762 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:35:34.164353 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:35:34.164386 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:35:34.166096 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:35:34.166127 systemd[1]: Stopped dracut-cmdline.service. May 10 00:35:34.167839 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:35:34.167872 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:35:34.170243 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:35:34.171280 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:35:34.171328 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:35:34.173762 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:35:34.173797 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:35:34.174922 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:35:34.174966 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:35:34.178283 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:35:34.178349 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:35:34.178850 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:35:34.178924 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:35:34.184005 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:35:34.186846 systemd[1]: Stopped network-cleanup.service. May 10 00:35:34.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.240484 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:35:34.240590 systemd[1]: Stopped sysroot-boot.service. May 10 00:35:34.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.243141 systemd[1]: Reached target initrd-switch-root.target. May 10 00:35:34.244937 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:35:34.244979 systemd[1]: Stopped initrd-setup-root.service. May 10 00:35:34.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:34.248328 systemd[1]: Starting initrd-switch-root.service... May 10 00:35:34.263523 systemd[1]: Switching root. May 10 00:35:34.284207 iscsid[739]: iscsid shutting down. May 10 00:35:34.285026 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 10 00:35:34.285068 systemd-journald[198]: Journal stopped May 10 00:35:36.740466 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:35:36.740516 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:35:36.740531 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:35:36.740544 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:35:36.740554 kernel: SELinux: policy capability open_perms=1 May 10 00:35:36.740564 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:35:36.740576 kernel: SELinux: policy capability always_check_network=0 May 10 00:35:36.740595 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:35:36.740604 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:35:36.740614 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:35:36.740623 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:35:36.740634 systemd[1]: Successfully loaded SELinux policy in 40.834ms. May 10 00:35:36.740654 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.012ms. May 10 00:35:36.740666 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:35:36.740679 systemd[1]: Detected virtualization kvm. May 10 00:35:36.740689 systemd[1]: Detected architecture x86-64. May 10 00:35:36.740699 systemd[1]: Detected first boot. May 10 00:35:36.740710 systemd[1]: Initializing machine ID from VM UUID. May 10 00:35:36.740720 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:35:36.740730 systemd[1]: Populated /etc with preset unit settings. May 10 00:35:36.740741 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:35:36.740752 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:35:36.740766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:35:36.740777 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:35:36.740787 systemd[1]: Stopped iscsiuio.service. May 10 00:35:36.740800 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:35:36.740810 systemd[1]: Stopped iscsid.service. May 10 00:35:36.740822 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:35:36.740836 systemd[1]: Stopped initrd-switch-root.service. May 10 00:35:36.740846 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:35:36.740857 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:35:36.740867 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:35:36.740878 systemd[1]: Created slice system-getty.slice. May 10 00:35:36.740889 systemd[1]: Created slice system-modprobe.slice. May 10 00:35:36.740899 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:35:36.740914 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:35:36.740932 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:35:36.740947 systemd[1]: Created slice user.slice. May 10 00:35:36.740961 systemd[1]: Started systemd-ask-password-console.path. May 10 00:35:36.740975 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:35:36.740990 systemd[1]: Set up automount boot.automount. May 10 00:35:36.741004 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:35:36.741018 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:35:36.741032 systemd[1]: Stopped target initrd-fs.target. May 10 00:35:36.741049 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:35:36.741064 systemd[1]: Reached target integritysetup.target. May 10 00:35:36.741079 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:35:36.741093 systemd[1]: Reached target remote-fs.target. May 10 00:35:36.741107 systemd[1]: Reached target slices.target. May 10 00:35:36.741123 systemd[1]: Reached target swap.target. May 10 00:35:36.741137 systemd[1]: Reached target torcx.target. May 10 00:35:36.741151 systemd[1]: Reached target veritysetup.target. May 10 00:35:36.741173 systemd[1]: Listening on systemd-coredump.socket. May 10 00:35:36.741189 systemd[1]: Listening on systemd-initctl.socket. May 10 00:35:36.741207 systemd[1]: Listening on systemd-networkd.socket. May 10 00:35:36.741222 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:35:36.741236 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:35:36.741250 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:35:36.741279 systemd[1]: Mounting dev-hugepages.mount... May 10 00:35:36.741294 systemd[1]: Mounting dev-mqueue.mount... May 10 00:35:36.741309 systemd[1]: Mounting media.mount... May 10 00:35:36.741323 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:36.741337 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:35:36.741354 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:35:36.741369 systemd[1]: Mounting tmp.mount... May 10 00:35:36.741383 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:35:36.741397 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:35:36.741411 systemd[1]: Starting kmod-static-nodes.service... May 10 00:35:36.741425 systemd[1]: Starting modprobe@configfs.service... May 10 00:35:36.741439 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:35:36.741455 systemd[1]: Starting modprobe@drm.service... May 10 00:35:36.741469 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:35:36.741486 systemd[1]: Starting modprobe@fuse.service... May 10 00:35:36.741500 systemd[1]: Starting modprobe@loop.service... May 10 00:35:36.741515 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:35:36.741529 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:35:36.741544 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:35:36.741557 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:35:36.741571 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:35:36.741584 kernel: fuse: init (API version 7.34) May 10 00:35:36.741597 kernel: loop: module loaded May 10 00:35:36.741613 systemd[1]: Stopped systemd-journald.service. May 10 00:35:36.741628 systemd[1]: Starting systemd-journald.service... May 10 00:35:36.741642 systemd[1]: Starting systemd-modules-load.service... May 10 00:35:36.741656 systemd[1]: Starting systemd-network-generator.service... May 10 00:35:36.741670 systemd[1]: Starting systemd-remount-fs.service... May 10 00:35:36.741684 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:35:36.741699 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:35:36.741712 systemd[1]: Stopped verity-setup.service. May 10 00:35:36.741726 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:36.741743 systemd[1]: Mounted dev-hugepages.mount. May 10 00:35:36.741759 systemd[1]: Mounted dev-mqueue.mount. May 10 00:35:36.741775 systemd-journald[1004]: Journal started May 10 00:35:36.741823 systemd-journald[1004]: Runtime Journal (/run/log/journal/d35c206b207d4a79a3116115cd99e3c8) is 6.0M, max 48.4M, 42.4M free. May 10 00:35:34.346000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:35:34.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:35:34.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:35:34.469000 audit: BPF prog-id=10 op=LOAD May 10 00:35:34.469000 audit: BPF prog-id=10 op=UNLOAD May 10 00:35:34.469000 audit: BPF prog-id=11 op=LOAD May 10 00:35:34.469000 audit: BPF prog-id=11 op=UNLOAD May 10 00:35:34.500000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:35:34.500000 audit[918]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001c58a2 a1=c000146de0 a2=c00014f0c0 a3=32 items=0 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:34.500000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:35:34.502000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:35:34.502000 audit[918]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001c5979 a2=1ed a3=0 items=2 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:34.502000 audit: CWD cwd="/" May 10 00:35:34.502000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:34.502000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:34.502000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:35:36.595000 audit: BPF prog-id=12 op=LOAD May 10 00:35:36.595000 audit: BPF prog-id=3 op=UNLOAD May 10 00:35:36.595000 audit: BPF prog-id=13 op=LOAD May 10 00:35:36.596000 audit: BPF prog-id=14 op=LOAD May 10 00:35:36.596000 audit: BPF prog-id=4 op=UNLOAD May 10 00:35:36.596000 audit: BPF prog-id=5 op=UNLOAD May 10 00:35:36.596000 audit: BPF prog-id=15 op=LOAD May 10 00:35:36.596000 audit: BPF prog-id=12 op=UNLOAD May 10 00:35:36.596000 audit: BPF prog-id=16 op=LOAD May 10 00:35:36.596000 audit: BPF prog-id=17 op=LOAD May 10 00:35:36.596000 audit: BPF prog-id=13 op=UNLOAD May 10 00:35:36.596000 audit: BPF prog-id=14 op=UNLOAD May 10 00:35:36.597000 audit: BPF prog-id=18 op=LOAD May 10 00:35:36.597000 audit: BPF prog-id=15 op=UNLOAD May 10 00:35:36.597000 audit: BPF prog-id=19 op=LOAD May 10 00:35:36.597000 audit: BPF prog-id=20 op=LOAD May 10 00:35:36.597000 audit: BPF prog-id=16 op=UNLOAD May 10 00:35:36.597000 audit: BPF prog-id=17 op=UNLOAD May 10 00:35:36.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.609000 audit: BPF prog-id=18 op=UNLOAD May 10 00:35:36.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.716000 audit: BPF prog-id=21 op=LOAD May 10 00:35:36.716000 audit: BPF prog-id=22 op=LOAD May 10 00:35:36.717000 audit: BPF prog-id=23 op=LOAD May 10 00:35:36.717000 audit: BPF prog-id=19 op=UNLOAD May 10 00:35:36.717000 audit: BPF prog-id=20 op=UNLOAD May 10 00:35:36.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.738000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:35:36.738000 audit[1004]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffc715880f0 a2=4000 a3=7ffc7158818c items=0 ppid=1 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:36.738000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:35:36.593729 systemd[1]: Queued start job for default target multi-user.target. May 10 00:35:36.743294 systemd[1]: Mounted media.mount. May 10 00:35:34.499075 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:35:36.593740 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:35:34.499300 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:35:36.598360 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:35:34.499318 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:35:34.499344 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:35:34.499354 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:35:34.499383 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:35:34.499394 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:35:34.499569 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:35:34.499605 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:35:34.499617 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:35:34.500197 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:35:34.500238 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:35:34.500256 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:35:34.500282 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:35:34.500297 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:35:34.500309 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:35:36.328259 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:35:36.328537 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:35:36.328637 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:35:36.328793 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:35:36.328839 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:35:36.328891 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-10T00:35:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:35:36.745281 systemd[1]: Started systemd-journald.service. May 10 00:35:36.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.745723 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:35:36.746607 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:35:36.747496 systemd[1]: Mounted tmp.mount. May 10 00:35:36.748377 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:35:36.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.749476 systemd[1]: Finished kmod-static-nodes.service. May 10 00:35:36.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.750524 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:35:36.750668 systemd[1]: Finished modprobe@configfs.service. May 10 00:35:36.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.751724 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:35:36.751865 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:35:36.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.752897 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:35:36.753031 systemd[1]: Finished modprobe@drm.service. May 10 00:35:36.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.754021 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:35:36.754155 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:35:36.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.755217 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:35:36.755352 systemd[1]: Finished modprobe@fuse.service. May 10 00:35:36.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.756482 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:35:36.756621 systemd[1]: Finished modprobe@loop.service. May 10 00:35:36.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.757715 systemd[1]: Finished systemd-modules-load.service. May 10 00:35:36.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.758911 systemd[1]: Finished systemd-network-generator.service. May 10 00:35:36.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.760175 systemd[1]: Finished systemd-remount-fs.service. May 10 00:35:36.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.761552 systemd[1]: Reached target network-pre.target. May 10 00:35:36.763634 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:35:36.765561 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:35:36.766462 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:35:36.768561 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:35:36.770741 systemd[1]: Starting systemd-journal-flush.service... May 10 00:35:36.771779 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:35:36.772771 systemd[1]: Starting systemd-random-seed.service... May 10 00:35:36.773803 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:35:36.774881 systemd[1]: Starting systemd-sysctl.service... May 10 00:35:36.777465 systemd[1]: Starting systemd-sysusers.service... May 10 00:35:36.780559 systemd-journald[1004]: Time spent on flushing to /var/log/journal/d35c206b207d4a79a3116115cd99e3c8 is 14.724ms for 1168 entries. May 10 00:35:36.780559 systemd-journald[1004]: System Journal (/var/log/journal/d35c206b207d4a79a3116115cd99e3c8) is 8.0M, max 195.6M, 187.6M free. May 10 00:35:36.842403 systemd-journald[1004]: Received client request to flush runtime journal. May 10 00:35:36.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.783199 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:35:36.843424 udevadm[1023]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:35:36.786499 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:35:36.787869 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:35:36.790198 systemd[1]: Starting systemd-udev-settle.service... May 10 00:35:36.791448 systemd[1]: Finished systemd-random-seed.service. May 10 00:35:36.792711 systemd[1]: Reached target first-boot-complete.target. May 10 00:35:36.797222 systemd[1]: Finished systemd-sysctl.service. May 10 00:35:36.804619 systemd[1]: Finished systemd-sysusers.service. May 10 00:35:36.806675 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:35:36.843140 systemd[1]: Finished systemd-journal-flush.service. May 10 00:35:36.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:36.845396 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:35:36.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.189621 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:35:37.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.191000 audit: BPF prog-id=24 op=LOAD May 10 00:35:37.191000 audit: BPF prog-id=25 op=LOAD May 10 00:35:37.191000 audit: BPF prog-id=7 op=UNLOAD May 10 00:35:37.191000 audit: BPF prog-id=8 op=UNLOAD May 10 00:35:37.192033 systemd[1]: Starting systemd-udevd.service... May 10 00:35:37.207193 systemd-udevd[1027]: Using default interface naming scheme 'v252'. May 10 00:35:37.220430 systemd[1]: Started systemd-udevd.service. May 10 00:35:37.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.222000 audit: BPF prog-id=26 op=LOAD May 10 00:35:37.223733 systemd[1]: Starting systemd-networkd.service... May 10 00:35:37.229000 audit: BPF prog-id=27 op=LOAD May 10 00:35:37.229000 audit: BPF prog-id=28 op=LOAD May 10 00:35:37.229000 audit: BPF prog-id=29 op=LOAD May 10 00:35:37.230649 systemd[1]: Starting systemd-userdbd.service... May 10 00:35:37.254222 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:35:37.261073 systemd[1]: Started systemd-userdbd.service. May 10 00:35:37.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.272729 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:35:37.293290 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:35:37.297281 kernel: ACPI: button: Power Button [PWRF] May 10 00:35:37.310912 systemd-networkd[1040]: lo: Link UP May 10 00:35:37.311146 systemd-networkd[1040]: lo: Gained carrier May 10 00:35:37.311805 systemd-networkd[1040]: Enumeration completed May 10 00:35:37.311977 systemd[1]: Started systemd-networkd.service. May 10 00:35:37.312282 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:35:37.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.313685 systemd-networkd[1040]: eth0: Link UP May 10 00:35:37.313770 systemd-networkd[1040]: eth0: Gained carrier May 10 00:35:37.311000 audit[1041]: AVC avc: denied { confidentiality } for pid=1041 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:35:37.311000 audit[1041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561eb381dd10 a1=338ac a2=7fb1dfeacbc5 a3=5 items=110 ppid=1027 pid=1041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:37.311000 audit: CWD cwd="/" May 10 00:35:37.311000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=1 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=2 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=3 name=(null) inode=14665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=4 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=5 name=(null) inode=14666 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=6 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=7 name=(null) inode=14667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=8 name=(null) inode=14667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=9 name=(null) inode=14668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=10 name=(null) inode=14667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=11 name=(null) inode=14669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=12 name=(null) inode=14667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=13 name=(null) inode=14670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=14 name=(null) inode=14667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=15 name=(null) inode=14671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=16 name=(null) inode=14667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=17 name=(null) inode=14672 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=18 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=19 name=(null) inode=14673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=20 name=(null) inode=14673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=21 name=(null) inode=14674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=22 name=(null) inode=14673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=23 name=(null) inode=14675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=24 name=(null) inode=14673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=25 name=(null) inode=14676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=26 name=(null) inode=14673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=27 name=(null) inode=14677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=28 name=(null) inode=14673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=29 name=(null) inode=14678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=30 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=31 name=(null) inode=14679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=32 name=(null) inode=14679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=33 name=(null) inode=14680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=34 name=(null) inode=14679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=35 name=(null) inode=14681 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=36 name=(null) inode=14679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=37 name=(null) inode=14682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=38 name=(null) inode=14679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=39 name=(null) inode=14683 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=40 name=(null) inode=14679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=41 name=(null) inode=14684 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=42 name=(null) inode=14664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=43 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=44 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=45 name=(null) inode=14686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=46 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=47 name=(null) inode=14687 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=48 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=49 name=(null) inode=14688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=50 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=51 name=(null) inode=14689 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=52 name=(null) inode=14685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=53 name=(null) inode=14690 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=55 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=56 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=57 name=(null) inode=14692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=58 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=59 name=(null) inode=14693 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=60 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=61 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=62 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=63 name=(null) inode=14695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=64 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=65 name=(null) inode=14696 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=66 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=67 name=(null) inode=14697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=68 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=69 name=(null) inode=14698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=70 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=71 name=(null) inode=14699 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=72 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=73 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=74 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=75 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=76 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=77 name=(null) inode=14702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=78 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=79 name=(null) inode=14703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=80 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=81 name=(null) inode=14704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=82 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=83 name=(null) inode=14705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=84 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=85 name=(null) inode=14706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=86 name=(null) inode=14706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=87 name=(null) inode=14707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=88 name=(null) inode=14706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=89 name=(null) inode=14708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=90 name=(null) inode=14706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=91 name=(null) inode=14709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=92 name=(null) inode=14706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=93 name=(null) inode=14710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=94 name=(null) inode=14706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=95 name=(null) inode=14711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=96 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=97 name=(null) inode=14712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=98 name=(null) inode=14712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=99 name=(null) inode=14713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=100 name=(null) inode=14712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=101 name=(null) inode=14714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=102 name=(null) inode=14712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=103 name=(null) inode=14715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=104 name=(null) inode=14712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=105 name=(null) inode=14716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=106 name=(null) inode=14712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=107 name=(null) inode=14717 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PATH item=109 name=(null) inode=14718 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:35:37.311000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:35:37.331694 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 10 00:35:37.333657 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 00:35:37.333772 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 00:35:37.333896 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 00:35:37.330952 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.17/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:35:37.348287 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:35:37.363286 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:35:37.410486 kernel: kvm: Nested Virtualization enabled May 10 00:35:37.410586 kernel: SVM: kvm: Nested Paging enabled May 10 00:35:37.411870 kernel: SVM: Virtual VMLOAD VMSAVE supported May 10 00:35:37.411902 kernel: SVM: Virtual GIF supported May 10 00:35:37.428282 kernel: EDAC MC: Ver: 3.0.0 May 10 00:35:37.455720 systemd[1]: Finished systemd-udev-settle.service. May 10 00:35:37.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.458114 systemd[1]: Starting lvm2-activation-early.service... May 10 00:35:37.465558 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:35:37.491512 systemd[1]: Finished lvm2-activation-early.service. May 10 00:35:37.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.492683 systemd[1]: Reached target cryptsetup.target. May 10 00:35:37.494816 systemd[1]: Starting lvm2-activation.service... May 10 00:35:37.498126 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:35:37.524924 systemd[1]: Finished lvm2-activation.service. May 10 00:35:37.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.525980 systemd[1]: Reached target local-fs-pre.target. May 10 00:35:37.526886 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:35:37.526917 systemd[1]: Reached target local-fs.target. May 10 00:35:37.527739 systemd[1]: Reached target machines.target. May 10 00:35:37.529823 systemd[1]: Starting ldconfig.service... May 10 00:35:37.530900 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:35:37.530950 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:37.531959 systemd[1]: Starting systemd-boot-update.service... May 10 00:35:37.533961 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:35:37.536307 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:35:37.538680 systemd[1]: Starting systemd-sysext.service... May 10 00:35:37.541438 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1066 (bootctl) May 10 00:35:37.542687 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:35:37.547992 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:35:37.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.551017 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:35:37.551163 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:35:37.551816 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:35:37.563294 kernel: loop0: detected capacity change from 0 to 218376 May 10 00:35:37.580793 systemd-fsck[1075]: fsck.fat 4.2 (2021-01-31) May 10 00:35:37.580793 systemd-fsck[1075]: /dev/vda1: 791 files, 120708/258078 clusters May 10 00:35:37.582558 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:35:37.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.585547 systemd[1]: Mounting boot.mount... May 10 00:35:37.675364 systemd[1]: Mounted boot.mount. May 10 00:35:37.686096 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:35:37.687295 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:35:37.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.688973 systemd[1]: Finished systemd-boot-update.service. May 10 00:35:37.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.707293 kernel: loop1: detected capacity change from 0 to 218376 May 10 00:35:37.712636 (sd-sysext)[1079]: Using extensions 'kubernetes'. May 10 00:35:37.713066 (sd-sysext)[1079]: Merged extensions into '/usr'. May 10 00:35:37.730429 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:35:37.731744 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:35:37.734033 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:35:37.736564 systemd[1]: Starting modprobe@loop.service... May 10 00:35:37.737493 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:35:37.737634 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:37.739327 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:35:37.740222 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:35:37.740410 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:35:37.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.741878 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:35:37.742012 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:35:37.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.743490 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:35:37.743605 systemd[1]: Finished modprobe@loop.service. May 10 00:35:37.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.745077 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:37.746577 systemd[1]: Mounting usr-share-oem.mount... May 10 00:35:37.747495 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:35:37.747656 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:35:37.747768 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:37.751414 ldconfig[1065]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:35:37.752138 systemd[1]: Mounted usr-share-oem.mount. May 10 00:35:37.754089 systemd[1]: Finished systemd-sysext.service. May 10 00:35:37.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.756485 systemd[1]: Starting ensure-sysext.service... May 10 00:35:37.758162 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:35:37.759424 systemd[1]: Finished ldconfig.service. May 10 00:35:37.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.763535 systemd[1]: Reloading. May 10 00:35:37.768520 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:35:37.769653 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:35:37.771099 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:35:37.815314 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-05-10T00:35:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:35:37.815643 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-05-10T00:35:37Z" level=info msg="torcx already run" May 10 00:35:37.869002 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:35:37.869019 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:35:37.885705 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:35:37.935000 audit: BPF prog-id=30 op=LOAD May 10 00:35:37.935000 audit: BPF prog-id=26 op=UNLOAD May 10 00:35:37.937000 audit: BPF prog-id=31 op=LOAD May 10 00:35:37.937000 audit: BPF prog-id=21 op=UNLOAD May 10 00:35:37.937000 audit: BPF prog-id=32 op=LOAD May 10 00:35:37.937000 audit: BPF prog-id=33 op=LOAD May 10 00:35:37.937000 audit: BPF prog-id=22 op=UNLOAD May 10 00:35:37.937000 audit: BPF prog-id=23 op=UNLOAD May 10 00:35:37.938000 audit: BPF prog-id=34 op=LOAD May 10 00:35:37.938000 audit: BPF prog-id=27 op=UNLOAD May 10 00:35:37.938000 audit: BPF prog-id=35 op=LOAD May 10 00:35:37.938000 audit: BPF prog-id=36 op=LOAD May 10 00:35:37.938000 audit: BPF prog-id=28 op=UNLOAD May 10 00:35:37.938000 audit: BPF prog-id=29 op=UNLOAD May 10 00:35:37.938000 audit: BPF prog-id=37 op=LOAD May 10 00:35:37.938000 audit: BPF prog-id=38 op=LOAD May 10 00:35:37.938000 audit: BPF prog-id=24 op=UNLOAD May 10 00:35:37.938000 audit: BPF prog-id=25 op=UNLOAD May 10 00:35:37.941770 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:35:37.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.946044 systemd[1]: Starting audit-rules.service... May 10 00:35:37.947957 systemd[1]: Starting clean-ca-certificates.service... May 10 00:35:37.949854 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:35:37.951000 audit: BPF prog-id=39 op=LOAD May 10 00:35:37.952442 systemd[1]: Starting systemd-resolved.service... May 10 00:35:37.953000 audit: BPF prog-id=40 op=LOAD May 10 00:35:37.954643 systemd[1]: Starting systemd-timesyncd.service... May 10 00:35:37.956520 systemd[1]: Starting systemd-update-utmp.service... May 10 00:35:37.958120 systemd[1]: Finished clean-ca-certificates.service. May 10 00:35:37.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.960000 audit[1159]: SYSTEM_BOOT pid=1159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:35:37.962792 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:35:37.966097 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:37.966493 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:35:37.967975 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:35:37.969967 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:35:37.971822 systemd[1]: Starting modprobe@loop.service... May 10 00:35:37.972708 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:35:37.972817 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:37.972914 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:35:37.972975 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:37.973909 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:35:37.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.975741 systemd[1]: Finished systemd-update-utmp.service. May 10 00:35:37.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.977070 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:35:37.977189 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:35:37.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.978573 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:35:37.978669 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:35:37.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.980095 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:35:37.980194 systemd[1]: Finished modprobe@loop.service. May 10 00:35:37.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:37.983023 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:37.983203 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:35:37.983741 augenrules[1171]: No rules May 10 00:35:37.983000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:35:37.983000 audit[1171]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd62e5b3e0 a2=420 a3=0 items=0 ppid=1148 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:37.983000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:35:37.984479 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:35:37.986375 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:35:37.988027 systemd[1]: Starting modprobe@loop.service... May 10 00:35:37.988852 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:35:37.988949 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:37.990018 systemd[1]: Starting systemd-update-done.service... May 10 00:35:37.990996 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:35:37.991189 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:37.992085 systemd[1]: Finished audit-rules.service. May 10 00:35:37.993522 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:35:37.993745 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:35:37.995216 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:35:37.995356 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:35:37.996871 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:35:37.997021 systemd[1]: Finished modprobe@loop.service. May 10 00:35:37.998392 systemd[1]: Finished systemd-update-done.service. May 10 00:35:37.999805 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:35:37.999934 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:35:38.002007 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:38.002210 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:35:38.003712 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:35:38.005447 systemd[1]: Starting modprobe@drm.service... May 10 00:35:38.008018 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:35:38.010201 systemd[1]: Starting modprobe@loop.service... May 10 00:35:38.011346 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:35:38.011514 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:38.011879 systemd-resolved[1154]: Positive Trust Anchors: May 10 00:35:38.011893 systemd-resolved[1154]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:35:38.011917 systemd-resolved[1154]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:35:38.628039 systemd-timesyncd[1158]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 10 00:35:38.628092 systemd-timesyncd[1158]: Initial clock synchronization to Sat 2025-05-10 00:35:38.627937 UTC. May 10 00:35:38.628358 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:35:38.629654 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:35:38.629804 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:35:38.630667 systemd[1]: Started systemd-timesyncd.service. May 10 00:35:38.632657 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:35:38.632781 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:35:38.634032 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:35:38.634129 systemd[1]: Finished modprobe@drm.service. May 10 00:35:38.634312 systemd-resolved[1154]: Defaulting to hostname 'linux'. May 10 00:35:38.635352 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:35:38.635449 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:35:38.636593 systemd[1]: Started systemd-resolved.service. May 10 00:35:38.637820 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:35:38.637914 systemd[1]: Finished modprobe@loop.service. May 10 00:35:38.639375 systemd[1]: Reached target network.target. May 10 00:35:38.640262 systemd[1]: Reached target nss-lookup.target. May 10 00:35:38.641151 systemd[1]: Reached target time-set.target. May 10 00:35:38.642000 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:35:38.642021 systemd[1]: Reached target sysinit.target. May 10 00:35:38.642962 systemd[1]: Started motdgen.path. May 10 00:35:38.643751 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:35:38.645083 systemd[1]: Started logrotate.timer. May 10 00:35:38.645945 systemd[1]: Started mdadm.timer. May 10 00:35:38.646702 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:35:38.647613 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:35:38.647636 systemd[1]: Reached target paths.target. May 10 00:35:38.648602 systemd[1]: Reached target timers.target. May 10 00:35:38.649721 systemd[1]: Listening on dbus.socket. May 10 00:35:38.651313 systemd[1]: Starting docker.socket... May 10 00:35:38.654019 systemd[1]: Listening on sshd.socket. May 10 00:35:38.654916 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:38.654957 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:35:38.655437 systemd[1]: Finished ensure-sysext.service. May 10 00:35:38.656440 systemd[1]: Listening on docker.socket. May 10 00:35:38.658001 systemd[1]: Reached target sockets.target. May 10 00:35:38.658863 systemd[1]: Reached target basic.target. May 10 00:35:38.659713 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:35:38.659733 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:35:38.660509 systemd[1]: Starting containerd.service... May 10 00:35:38.662023 systemd[1]: Starting dbus.service... May 10 00:35:38.663599 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:35:38.665580 systemd[1]: Starting extend-filesystems.service... May 10 00:35:38.666807 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:35:38.667778 jq[1190]: false May 10 00:35:38.667926 systemd[1]: Starting motdgen.service... May 10 00:35:38.670061 systemd[1]: Starting prepare-helm.service... May 10 00:35:38.672244 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:35:38.674681 systemd[1]: Starting sshd-keygen.service... May 10 00:35:38.678488 systemd[1]: Starting systemd-logind.service... May 10 00:35:38.679530 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:35:38.679632 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:35:38.680165 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:35:38.681085 systemd[1]: Starting update-engine.service... May 10 00:35:38.683497 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:35:38.686987 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:35:38.687216 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:35:38.687601 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:35:38.687791 systemd[1]: Finished motdgen.service. May 10 00:35:38.688187 jq[1208]: true May 10 00:35:38.690193 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:35:38.690425 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:35:38.691796 dbus-daemon[1189]: [system] SELinux support is enabled May 10 00:35:38.692011 systemd[1]: Started dbus.service. May 10 00:35:38.696105 extend-filesystems[1191]: Found loop1 May 10 00:35:38.697217 extend-filesystems[1191]: Found sr0 May 10 00:35:38.697217 extend-filesystems[1191]: Found vda May 10 00:35:38.697217 extend-filesystems[1191]: Found vda1 May 10 00:35:38.697217 extend-filesystems[1191]: Found vda2 May 10 00:35:38.697217 extend-filesystems[1191]: Found vda3 May 10 00:35:38.697217 extend-filesystems[1191]: Found usr May 10 00:35:38.697217 extend-filesystems[1191]: Found vda4 May 10 00:35:38.697217 extend-filesystems[1191]: Found vda6 May 10 00:35:38.697217 extend-filesystems[1191]: Found vda7 May 10 00:35:38.697217 extend-filesystems[1191]: Found vda9 May 10 00:35:38.697217 extend-filesystems[1191]: Checking size of /dev/vda9 May 10 00:35:38.705779 jq[1213]: true May 10 00:35:38.706629 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:35:38.706663 systemd[1]: Reached target system-config.target. May 10 00:35:38.709073 tar[1211]: linux-amd64/LICENSE May 10 00:35:38.709364 tar[1211]: linux-amd64/helm May 10 00:35:38.709782 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:35:38.709817 systemd[1]: Reached target user-config.target. May 10 00:35:38.718018 update_engine[1207]: I0510 00:35:38.717896 1207 main.cc:92] Flatcar Update Engine starting May 10 00:35:38.726361 systemd[1]: Started update-engine.service. May 10 00:35:38.726499 update_engine[1207]: I0510 00:35:38.726481 1207 update_check_scheduler.cc:74] Next update check in 3m12s May 10 00:35:38.733997 extend-filesystems[1191]: Resized partition /dev/vda9 May 10 00:35:38.736605 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:35:38.740023 systemd[1]: Started locksmithd.service. May 10 00:35:38.741706 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 10 00:35:38.744031 systemd-logind[1205]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:35:38.744053 systemd-logind[1205]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:35:38.746815 systemd-logind[1205]: New seat seat0. May 10 00:35:38.748508 systemd[1]: Started systemd-logind.service. May 10 00:35:38.765781 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 10 00:35:38.793633 env[1215]: time="2025-05-10T00:35:38.793565043Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:35:38.795155 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:35:38.795155 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:35:38.795155 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 10 00:35:38.799235 extend-filesystems[1191]: Resized filesystem in /dev/vda9 May 10 00:35:38.800377 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:35:38.800536 systemd[1]: Finished extend-filesystems.service. May 10 00:35:38.805004 bash[1243]: Updated "/home/core/.ssh/authorized_keys" May 10 00:35:38.805258 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:35:38.818402 env[1215]: time="2025-05-10T00:35:38.818359250Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:35:38.818524 env[1215]: time="2025-05-10T00:35:38.818499884Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:35:38.819845 env[1215]: time="2025-05-10T00:35:38.819813448Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:35:38.819845 env[1215]: time="2025-05-10T00:35:38.819841170Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:35:38.820061 env[1215]: time="2025-05-10T00:35:38.820030175Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:35:38.820061 env[1215]: time="2025-05-10T00:35:38.820055803Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:35:38.820130 env[1215]: time="2025-05-10T00:35:38.820069027Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:35:38.820130 env[1215]: time="2025-05-10T00:35:38.820078074Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:35:38.820169 env[1215]: time="2025-05-10T00:35:38.820137766Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:35:38.820351 env[1215]: time="2025-05-10T00:35:38.820326290Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:35:38.820467 env[1215]: time="2025-05-10T00:35:38.820440434Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:35:38.820467 env[1215]: time="2025-05-10T00:35:38.820461153Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:35:38.820533 env[1215]: time="2025-05-10T00:35:38.820506087Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:35:38.820533 env[1215]: time="2025-05-10T00:35:38.820516487Z" level=info msg="metadata content store policy set" policy=shared May 10 00:35:38.825639 locksmithd[1232]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:35:38.826740 env[1215]: time="2025-05-10T00:35:38.826711447Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:35:38.826784 env[1215]: time="2025-05-10T00:35:38.826741774Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:35:38.826784 env[1215]: time="2025-05-10T00:35:38.826755038Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:35:38.826824 env[1215]: time="2025-05-10T00:35:38.826788471Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826824 env[1215]: time="2025-05-10T00:35:38.826802467Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826824 env[1215]: time="2025-05-10T00:35:38.826814931Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826889 env[1215]: time="2025-05-10T00:35:38.826825761Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826889 env[1215]: time="2025-05-10T00:35:38.826838265Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826889 env[1215]: time="2025-05-10T00:35:38.826849977Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826889 env[1215]: time="2025-05-10T00:35:38.826861438Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826889 env[1215]: time="2025-05-10T00:35:38.826872358Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:35:38.826889 env[1215]: time="2025-05-10T00:35:38.826885864Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:35:38.826999 env[1215]: time="2025-05-10T00:35:38.826966345Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:35:38.827054 env[1215]: time="2025-05-10T00:35:38.827029082Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:35:38.827262 env[1215]: time="2025-05-10T00:35:38.827238856Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:35:38.827304 env[1215]: time="2025-05-10T00:35:38.827267510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827304 env[1215]: time="2025-05-10T00:35:38.827280163Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:35:38.827344 env[1215]: time="2025-05-10T00:35:38.827320980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827344 env[1215]: time="2025-05-10T00:35:38.827333794Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827388 env[1215]: time="2025-05-10T00:35:38.827345215Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827388 env[1215]: time="2025-05-10T00:35:38.827356416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827388 env[1215]: time="2025-05-10T00:35:38.827367006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827388 env[1215]: time="2025-05-10T00:35:38.827378488Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827459 env[1215]: time="2025-05-10T00:35:38.827389268Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827459 env[1215]: time="2025-05-10T00:35:38.827400058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827459 env[1215]: time="2025-05-10T00:35:38.827411991Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:35:38.827525 env[1215]: time="2025-05-10T00:35:38.827513591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827548 env[1215]: time="2025-05-10T00:35:38.827527688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827548 env[1215]: time="2025-05-10T00:35:38.827538768Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827601 env[1215]: time="2025-05-10T00:35:38.827549749Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:35:38.827601 env[1215]: time="2025-05-10T00:35:38.827573283Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:35:38.827601 env[1215]: time="2025-05-10T00:35:38.827583552Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:35:38.827659 env[1215]: time="2025-05-10T00:35:38.827600494Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:35:38.827659 env[1215]: time="2025-05-10T00:35:38.827632344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:35:38.827872 env[1215]: time="2025-05-10T00:35:38.827817371Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:35:38.827872 env[1215]: time="2025-05-10T00:35:38.827874047Z" level=info msg="Connect containerd service" May 10 00:35:38.828486 env[1215]: time="2025-05-10T00:35:38.827902441Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:35:38.828486 env[1215]: time="2025-05-10T00:35:38.828386499Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:35:38.828614 env[1215]: time="2025-05-10T00:35:38.828590291Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:35:38.828656 env[1215]: time="2025-05-10T00:35:38.828629635Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:35:38.828710 env[1215]: time="2025-05-10T00:35:38.828666784Z" level=info msg="containerd successfully booted in 0.059359s" May 10 00:35:38.828759 env[1215]: time="2025-05-10T00:35:38.828724452Z" level=info msg="Start subscribing containerd event" May 10 00:35:38.828752 systemd[1]: Started containerd.service. May 10 00:35:38.828838 env[1215]: time="2025-05-10T00:35:38.828766271Z" level=info msg="Start recovering state" May 10 00:35:38.828991 env[1215]: time="2025-05-10T00:35:38.828963781Z" level=info msg="Start event monitor" May 10 00:35:38.829033 env[1215]: time="2025-05-10T00:35:38.828995631Z" level=info msg="Start snapshots syncer" May 10 00:35:38.829033 env[1215]: time="2025-05-10T00:35:38.829006331Z" level=info msg="Start cni network conf syncer for default" May 10 00:35:38.829033 env[1215]: time="2025-05-10T00:35:38.829017041Z" level=info msg="Start streaming server" May 10 00:35:39.129357 tar[1211]: linux-amd64/README.md May 10 00:35:39.134055 systemd[1]: Finished prepare-helm.service. May 10 00:35:39.298299 sshd_keygen[1209]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:35:39.316102 systemd[1]: Finished sshd-keygen.service. May 10 00:35:39.318508 systemd[1]: Starting issuegen.service... May 10 00:35:39.323307 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:35:39.323465 systemd[1]: Finished issuegen.service. May 10 00:35:39.325610 systemd[1]: Starting systemd-user-sessions.service... May 10 00:35:39.330537 systemd[1]: Finished systemd-user-sessions.service. May 10 00:35:39.332902 systemd[1]: Started getty@tty1.service. May 10 00:35:39.334960 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:35:39.336173 systemd[1]: Reached target getty.target. May 10 00:35:39.808870 systemd-networkd[1040]: eth0: Gained IPv6LL May 10 00:35:39.811090 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:35:39.812756 systemd[1]: Reached target network-online.target. May 10 00:35:39.815390 systemd[1]: Starting kubelet.service... May 10 00:35:40.468019 systemd[1]: Started kubelet.service. May 10 00:35:40.469404 systemd[1]: Reached target multi-user.target. May 10 00:35:40.471794 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:35:40.478757 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:35:40.478894 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:35:40.480127 systemd[1]: Startup finished in 901ms (kernel) + 4.470s (initrd) + 5.560s (userspace) = 10.932s. May 10 00:35:40.872997 kubelet[1271]: E0510 00:35:40.872859 1271 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:35:40.874371 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:35:40.874490 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:35:43.345629 systemd[1]: Created slice system-sshd.slice. May 10 00:35:43.347097 systemd[1]: Started sshd@0-10.0.0.17:22-10.0.0.1:44008.service. May 10 00:35:43.387587 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 44008 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:43.389456 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.398364 systemd[1]: Created slice user-500.slice. May 10 00:35:43.399411 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:35:43.401863 systemd-logind[1205]: New session 1 of user core. May 10 00:35:43.407600 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:35:43.409131 systemd[1]: Starting user@500.service... May 10 00:35:43.412098 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.483806 systemd[1283]: Queued start job for default target default.target. May 10 00:35:43.484463 systemd[1283]: Reached target paths.target. May 10 00:35:43.484492 systemd[1283]: Reached target sockets.target. May 10 00:35:43.484510 systemd[1283]: Reached target timers.target. May 10 00:35:43.484526 systemd[1283]: Reached target basic.target. May 10 00:35:43.484575 systemd[1283]: Reached target default.target. May 10 00:35:43.484608 systemd[1283]: Startup finished in 66ms. May 10 00:35:43.484680 systemd[1]: Started user@500.service. May 10 00:35:43.485787 systemd[1]: Started session-1.scope. May 10 00:35:43.537611 systemd[1]: Started sshd@1-10.0.0.17:22-10.0.0.1:44016.service. May 10 00:35:43.575394 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 44016 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:43.576548 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.580459 systemd-logind[1205]: New session 2 of user core. May 10 00:35:43.581820 systemd[1]: Started session-2.scope. May 10 00:35:43.636398 sshd[1292]: pam_unix(sshd:session): session closed for user core May 10 00:35:43.639630 systemd[1]: sshd@1-10.0.0.17:22-10.0.0.1:44016.service: Deactivated successfully. May 10 00:35:43.640283 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:35:43.640800 systemd-logind[1205]: Session 2 logged out. Waiting for processes to exit. May 10 00:35:43.642038 systemd[1]: Started sshd@2-10.0.0.17:22-10.0.0.1:44020.service. May 10 00:35:43.642898 systemd-logind[1205]: Removed session 2. May 10 00:35:43.678999 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 44020 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:43.679998 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.683253 systemd-logind[1205]: New session 3 of user core. May 10 00:35:43.684195 systemd[1]: Started session-3.scope. May 10 00:35:43.733208 sshd[1298]: pam_unix(sshd:session): session closed for user core May 10 00:35:43.736633 systemd[1]: sshd@2-10.0.0.17:22-10.0.0.1:44020.service: Deactivated successfully. May 10 00:35:43.737279 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:35:43.737886 systemd-logind[1205]: Session 3 logged out. Waiting for processes to exit. May 10 00:35:43.739006 systemd[1]: Started sshd@3-10.0.0.17:22-10.0.0.1:44034.service. May 10 00:35:43.739854 systemd-logind[1205]: Removed session 3. May 10 00:35:43.775743 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 44034 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:43.776736 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.779862 systemd-logind[1205]: New session 4 of user core. May 10 00:35:43.780800 systemd[1]: Started session-4.scope. May 10 00:35:43.833584 sshd[1304]: pam_unix(sshd:session): session closed for user core May 10 00:35:43.836821 systemd[1]: sshd@3-10.0.0.17:22-10.0.0.1:44034.service: Deactivated successfully. May 10 00:35:43.837348 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:35:43.837840 systemd-logind[1205]: Session 4 logged out. Waiting for processes to exit. May 10 00:35:43.838916 systemd[1]: Started sshd@4-10.0.0.17:22-10.0.0.1:44036.service. May 10 00:35:43.839826 systemd-logind[1205]: Removed session 4. May 10 00:35:43.875567 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 44036 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:43.876599 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.879843 systemd-logind[1205]: New session 5 of user core. May 10 00:35:43.880607 systemd[1]: Started session-5.scope. May 10 00:35:43.934753 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:35:43.934965 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:35:43.943883 dbus-daemon[1189]: \xd0\xcd\xeb\u0003\u0005V: received setenforce notice (enforcing=323308880) May 10 00:35:43.945952 sudo[1314]: pam_unix(sudo:session): session closed for user root May 10 00:35:43.947548 sshd[1310]: pam_unix(sshd:session): session closed for user core May 10 00:35:43.950634 systemd[1]: sshd@4-10.0.0.17:22-10.0.0.1:44036.service: Deactivated successfully. May 10 00:35:43.951270 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:35:43.951869 systemd-logind[1205]: Session 5 logged out. Waiting for processes to exit. May 10 00:35:43.953204 systemd[1]: Started sshd@5-10.0.0.17:22-10.0.0.1:44050.service. May 10 00:35:43.953873 systemd-logind[1205]: Removed session 5. May 10 00:35:43.990046 sshd[1318]: Accepted publickey for core from 10.0.0.1 port 44050 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:43.991174 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:43.994333 systemd-logind[1205]: New session 6 of user core. May 10 00:35:43.995122 systemd[1]: Started session-6.scope. May 10 00:35:44.047051 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:35:44.047245 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:35:44.049865 sudo[1322]: pam_unix(sudo:session): session closed for user root May 10 00:35:44.053583 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:35:44.053788 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:35:44.061880 systemd[1]: Stopping audit-rules.service... May 10 00:35:44.061000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:35:44.062976 auditctl[1325]: No rules May 10 00:35:44.063755 kernel: kauditd_printk_skb: 273 callbacks suppressed May 10 00:35:44.063785 kernel: audit: type=1305 audit(1746837344.061:202): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:35:44.063931 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:35:44.064060 systemd[1]: Stopped audit-rules.service. May 10 00:35:44.065280 systemd[1]: Starting audit-rules.service... May 10 00:35:44.061000 audit[1325]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3d4e1480 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.071700 kernel: audit: type=1300 audit(1746837344.061:202): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3d4e1480 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.061000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:35:44.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.077449 kernel: audit: type=1327 audit(1746837344.061:202): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:35:44.077489 kernel: audit: type=1131 audit(1746837344.062:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.084847 augenrules[1342]: No rules May 10 00:35:44.085583 systemd[1]: Finished audit-rules.service. May 10 00:35:44.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.086904 sudo[1321]: pam_unix(sudo:session): session closed for user root May 10 00:35:44.085000 audit[1321]: USER_END pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.088355 sshd[1318]: pam_unix(sshd:session): session closed for user core May 10 00:35:44.091034 systemd[1]: sshd@5-10.0.0.17:22-10.0.0.1:44050.service: Deactivated successfully. May 10 00:35:44.091641 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:35:44.092264 systemd-logind[1205]: Session 6 logged out. Waiting for processes to exit. May 10 00:35:44.093716 kernel: audit: type=1130 audit(1746837344.084:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.093794 kernel: audit: type=1106 audit(1746837344.085:205): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.093830 kernel: audit: type=1104 audit(1746837344.085:206): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.085000 audit[1321]: CRED_DISP pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.093111 systemd[1]: Started sshd@6-10.0.0.17:22-10.0.0.1:44062.service. May 10 00:35:44.093931 systemd-logind[1205]: Removed session 6. May 10 00:35:44.087000 audit[1318]: USER_END pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.100545 kernel: audit: type=1106 audit(1746837344.087:207): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.100580 kernel: audit: type=1104 audit(1746837344.087:208): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.087000 audit[1318]: CRED_DISP pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.104134 kernel: audit: type=1131 audit(1746837344.089:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.17:22-10.0.0.1:44050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.17:22-10.0.0.1:44050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.17:22-10.0.0.1:44062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.136000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.138857 sshd[1348]: Accepted publickey for core from 10.0.0.1 port 44062 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:35:44.138000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.138000 audit[1348]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe167a6df0 a2=3 a3=0 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:35:44.140161 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:35:44.144001 systemd-logind[1205]: New session 7 of user core. May 10 00:35:44.144761 systemd[1]: Started session-7.scope. May 10 00:35:44.147000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.149000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:35:44.196000 audit[1351]: USER_ACCT pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.196000 audit[1351]: CRED_REFR pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.198077 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:35:44.198281 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:35:44.198000 audit[1351]: USER_START pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:35:44.223065 systemd[1]: Starting docker.service... May 10 00:35:44.260393 env[1362]: time="2025-05-10T00:35:44.260322157Z" level=info msg="Starting up" May 10 00:35:44.261953 env[1362]: time="2025-05-10T00:35:44.261898624Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:35:44.261953 env[1362]: time="2025-05-10T00:35:44.261928931Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:35:44.261953 env[1362]: time="2025-05-10T00:35:44.261949139Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:35:44.261953 env[1362]: time="2025-05-10T00:35:44.261958537Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:35:44.263587 env[1362]: time="2025-05-10T00:35:44.263552266Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:35:44.263587 env[1362]: time="2025-05-10T00:35:44.263572915Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:35:44.263587 env[1362]: time="2025-05-10T00:35:44.263585037Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:35:44.263738 env[1362]: time="2025-05-10T00:35:44.263592762Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:35:44.583861 env[1362]: time="2025-05-10T00:35:44.583729778Z" level=info msg="Loading containers: start." May 10 00:35:44.639000 audit[1397]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.639000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc7e2f8420 a2=0 a3=7ffc7e2f840c items=0 ppid=1362 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:35:44.641000 audit[1399]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.641000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff819d83b0 a2=0 a3=7fff819d839c items=0 ppid=1362 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:35:44.642000 audit[1401]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.642000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd8343c4f0 a2=0 a3=7ffd8343c4dc items=0 ppid=1362 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.642000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:35:44.644000 audit[1403]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.644000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff5a250c30 a2=0 a3=7fff5a250c1c items=0 ppid=1362 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:35:44.646000 audit[1405]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.646000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8c2727a0 a2=0 a3=7ffd8c27278c items=0 ppid=1362 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:35:44.667000 audit[1410]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.667000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2f477a20 a2=0 a3=7fff2f477a0c items=0 ppid=1362 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:35:44.678000 audit[1412]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.678000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd06ae620 a2=0 a3=7ffdd06ae60c items=0 ppid=1362 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:35:44.679000 audit[1414]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.679000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd22a00810 a2=0 a3=7ffd22a007fc items=0 ppid=1362 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:35:44.680000 audit[1416]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.680000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff64127b50 a2=0 a3=7fff64127b3c items=0 ppid=1362 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.680000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:35:44.688000 audit[1420]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.688000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffd8a60930 a2=0 a3=7fffd8a6091c items=0 ppid=1362 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:35:44.694000 audit[1421]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.694000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe44139ce0 a2=0 a3=7ffe44139ccc items=0 ppid=1362 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.694000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:35:44.705722 kernel: Initializing XFRM netlink socket May 10 00:35:44.732024 env[1362]: time="2025-05-10T00:35:44.731973731Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:35:44.746000 audit[1429]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.746000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe77ed4c00 a2=0 a3=7ffe77ed4bec items=0 ppid=1362 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:35:44.755000 audit[1432]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.755000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd55f9fdd0 a2=0 a3=7ffd55f9fdbc items=0 ppid=1362 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:35:44.758000 audit[1435]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.758000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc3fc8efe0 a2=0 a3=7ffc3fc8efcc items=0 ppid=1362 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:35:44.760000 audit[1437]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.760000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc2ae6bfb0 a2=0 a3=7ffc2ae6bf9c items=0 ppid=1362 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:35:44.761000 audit[1439]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.761000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe7cde9eb0 a2=0 a3=7ffe7cde9e9c items=0 ppid=1362 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:35:44.763000 audit[1441]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.763000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc884d0ac0 a2=0 a3=7ffc884d0aac items=0 ppid=1362 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:35:44.765000 audit[1443]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.765000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffa4469f40 a2=0 a3=7fffa4469f2c items=0 ppid=1362 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:35:44.771000 audit[1446]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.771000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffca8b528a0 a2=0 a3=7ffca8b5288c items=0 ppid=1362 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:35:44.773000 audit[1448]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.773000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffc1591a80 a2=0 a3=7fffc1591a6c items=0 ppid=1362 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:35:44.774000 audit[1450]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.774000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe4826c3e0 a2=0 a3=7ffe4826c3cc items=0 ppid=1362 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:35:44.776000 audit[1452]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.776000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf0b8c020 a2=0 a3=7ffdf0b8c00c items=0 ppid=1362 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:35:44.778633 systemd-networkd[1040]: docker0: Link UP May 10 00:35:44.786000 audit[1456]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.786000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8e308810 a2=0 a3=7ffc8e3087fc items=0 ppid=1362 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:35:44.793000 audit[1457]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:35:44.793000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe521e6170 a2=0 a3=7ffe521e615c items=0 ppid=1362 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:35:44.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:35:44.795986 env[1362]: time="2025-05-10T00:35:44.795953509Z" level=info msg="Loading containers: done." May 10 00:35:44.804594 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2267729967-merged.mount: Deactivated successfully. May 10 00:35:44.808737 env[1362]: time="2025-05-10T00:35:44.808674469Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:35:44.808885 env[1362]: time="2025-05-10T00:35:44.808861911Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:35:44.808960 env[1362]: time="2025-05-10T00:35:44.808941570Z" level=info msg="Daemon has completed initialization" May 10 00:35:44.826006 systemd[1]: Started docker.service. May 10 00:35:44.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:44.829665 env[1362]: time="2025-05-10T00:35:44.829613134Z" level=info msg="API listen on /run/docker.sock" May 10 00:35:45.536959 env[1215]: time="2025-05-10T00:35:45.536876478Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 10 00:35:46.150716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount184911403.mount: Deactivated successfully. May 10 00:35:47.835536 env[1215]: time="2025-05-10T00:35:47.835466206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:47.837963 env[1215]: time="2025-05-10T00:35:47.837929656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:47.841269 env[1215]: time="2025-05-10T00:35:47.841223545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:47.843006 env[1215]: time="2025-05-10T00:35:47.842974960Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:47.843652 env[1215]: time="2025-05-10T00:35:47.843619589Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 10 00:35:47.844181 env[1215]: time="2025-05-10T00:35:47.844149814Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 10 00:35:50.270135 env[1215]: time="2025-05-10T00:35:50.270052624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:50.272026 env[1215]: time="2025-05-10T00:35:50.271952497Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:50.273674 env[1215]: time="2025-05-10T00:35:50.273639542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:50.275926 env[1215]: time="2025-05-10T00:35:50.275869525Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:50.276698 env[1215]: time="2025-05-10T00:35:50.276641162Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 10 00:35:50.277366 env[1215]: time="2025-05-10T00:35:50.277323432Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 10 00:35:51.125480 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:35:51.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:51.125774 systemd[1]: Stopped kubelet.service. May 10 00:35:51.126833 kernel: kauditd_printk_skb: 84 callbacks suppressed May 10 00:35:51.126889 kernel: audit: type=1130 audit(1746837351.124:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:51.127879 systemd[1]: Starting kubelet.service... May 10 00:35:51.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:51.133382 kernel: audit: type=1131 audit(1746837351.124:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:51.230021 systemd[1]: Started kubelet.service. May 10 00:35:51.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:51.234733 kernel: audit: type=1130 audit(1746837351.228:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:35:51.298842 kubelet[1498]: E0510 00:35:51.298786 1498 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:35:51.301728 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:35:51.301857 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:35:51.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:35:51.306732 kernel: audit: type=1131 audit(1746837351.300:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:35:52.299917 env[1215]: time="2025-05-10T00:35:52.299858379Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:52.301914 env[1215]: time="2025-05-10T00:35:52.301878258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:52.304142 env[1215]: time="2025-05-10T00:35:52.304112549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:52.306213 env[1215]: time="2025-05-10T00:35:52.306185096Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:52.307275 env[1215]: time="2025-05-10T00:35:52.307195652Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 10 00:35:52.307838 env[1215]: time="2025-05-10T00:35:52.307799014Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 10 00:35:53.442259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4005299541.mount: Deactivated successfully. May 10 00:35:54.287724 env[1215]: time="2025-05-10T00:35:54.287619291Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:54.290066 env[1215]: time="2025-05-10T00:35:54.290009464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:54.291770 env[1215]: time="2025-05-10T00:35:54.291735331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:54.293156 env[1215]: time="2025-05-10T00:35:54.293101524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:54.293482 env[1215]: time="2025-05-10T00:35:54.293449296Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 10 00:35:54.293918 env[1215]: time="2025-05-10T00:35:54.293895844Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 10 00:35:54.817570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2514405821.mount: Deactivated successfully. May 10 00:35:55.879847 env[1215]: time="2025-05-10T00:35:55.879782574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:55.881584 env[1215]: time="2025-05-10T00:35:55.881538708Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:55.885769 env[1215]: time="2025-05-10T00:35:55.885711425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:55.888050 env[1215]: time="2025-05-10T00:35:55.888008794Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:55.889540 env[1215]: time="2025-05-10T00:35:55.889446751Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 10 00:35:55.890207 env[1215]: time="2025-05-10T00:35:55.890167874Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 00:35:56.462198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount849209295.mount: Deactivated successfully. May 10 00:35:56.467803 env[1215]: time="2025-05-10T00:35:56.467738972Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:56.469624 env[1215]: time="2025-05-10T00:35:56.469586357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:56.470938 env[1215]: time="2025-05-10T00:35:56.470895913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:56.472171 env[1215]: time="2025-05-10T00:35:56.472136350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:56.472584 env[1215]: time="2025-05-10T00:35:56.472554845Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 00:35:56.473015 env[1215]: time="2025-05-10T00:35:56.472985733Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 10 00:35:57.019888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2422539222.mount: Deactivated successfully. May 10 00:35:59.525426 env[1215]: time="2025-05-10T00:35:59.525360736Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:59.527741 env[1215]: time="2025-05-10T00:35:59.527708400Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:59.530256 env[1215]: time="2025-05-10T00:35:59.530224269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:59.532163 env[1215]: time="2025-05-10T00:35:59.532119043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:35:59.533077 env[1215]: time="2025-05-10T00:35:59.533047865Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 10 00:36:01.552747 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:36:01.552936 systemd[1]: Stopped kubelet.service. May 10 00:36:01.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.567222 kernel: audit: type=1130 audit(1746837361.551:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.567273 kernel: audit: type=1131 audit(1746837361.551:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.568239 systemd[1]: Starting kubelet.service... May 10 00:36:01.653613 systemd[1]: Started kubelet.service. May 10 00:36:01.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.658718 kernel: audit: type=1130 audit(1746837361.652:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.689352 kubelet[1530]: E0510 00:36:01.689291 1530 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:36:01.691211 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:36:01.691328 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:36:01.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:36:01.696707 kernel: audit: type=1131 audit(1746837361.689:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:36:01.840278 systemd[1]: Stopped kubelet.service. May 10 00:36:01.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.842611 systemd[1]: Starting kubelet.service... May 10 00:36:01.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.847727 kernel: audit: type=1130 audit(1746837361.838:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.847795 kernel: audit: type=1131 audit(1746837361.838:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:01.867961 systemd[1]: Reloading. May 10 00:36:01.936067 /usr/lib/systemd/system-generators/torcx-generator[1564]: time="2025-05-10T00:36:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:36:01.936101 /usr/lib/systemd/system-generators/torcx-generator[1564]: time="2025-05-10T00:36:01Z" level=info msg="torcx already run" May 10 00:36:02.325714 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:36:02.325729 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:36:02.342871 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:36:02.412463 kernel: audit: type=1400 audit(1746837362.400:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412597 kernel: audit: type=1400 audit(1746837362.400:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412618 kernel: audit: type=1400 audit(1746837362.400:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416758 kernel: audit: type=1400 audit(1746837362.400:257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.407000 audit: BPF prog-id=46 op=LOAD May 10 00:36:02.407000 audit: BPF prog-id=30 op=UNLOAD May 10 00:36:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.410000 audit: BPF prog-id=47 op=LOAD May 10 00:36:02.410000 audit: BPF prog-id=39 op=UNLOAD May 10 00:36:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit: BPF prog-id=48 op=LOAD May 10 00:36:02.414000 audit: BPF prog-id=31 op=UNLOAD May 10 00:36:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit: BPF prog-id=49 op=LOAD May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit: BPF prog-id=50 op=LOAD May 10 00:36:02.415000 audit: BPF prog-id=32 op=UNLOAD May 10 00:36:02.415000 audit: BPF prog-id=33 op=UNLOAD May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit: BPF prog-id=51 op=LOAD May 10 00:36:02.416000 audit: BPF prog-id=34 op=UNLOAD May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit: BPF prog-id=52 op=LOAD May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.416000 audit: BPF prog-id=53 op=LOAD May 10 00:36:02.416000 audit: BPF prog-id=35 op=UNLOAD May 10 00:36:02.416000 audit: BPF prog-id=36 op=UNLOAD May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit: BPF prog-id=54 op=LOAD May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.417000 audit: BPF prog-id=55 op=LOAD May 10 00:36:02.417000 audit: BPF prog-id=37 op=UNLOAD May 10 00:36:02.417000 audit: BPF prog-id=38 op=UNLOAD May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit: BPF prog-id=56 op=LOAD May 10 00:36:02.419000 audit: BPF prog-id=40 op=UNLOAD May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.420000 audit: BPF prog-id=57 op=LOAD May 10 00:36:02.420000 audit: BPF prog-id=44 op=UNLOAD May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit: BPF prog-id=58 op=LOAD May 10 00:36:02.422000 audit: BPF prog-id=41 op=UNLOAD May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit: BPF prog-id=59 op=LOAD May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:02.422000 audit: BPF prog-id=60 op=LOAD May 10 00:36:02.422000 audit: BPF prog-id=42 op=UNLOAD May 10 00:36:02.423000 audit: BPF prog-id=43 op=UNLOAD May 10 00:36:02.433046 systemd[1]: Started kubelet.service. May 10 00:36:02.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:02.436652 systemd[1]: Stopping kubelet.service... May 10 00:36:02.437210 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:36:02.437408 systemd[1]: Stopped kubelet.service. May 10 00:36:02.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:02.439078 systemd[1]: Starting kubelet.service... May 10 00:36:02.525726 systemd[1]: Started kubelet.service. May 10 00:36:02.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:02.602502 kubelet[1617]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:36:02.602502 kubelet[1617]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:36:02.602502 kubelet[1617]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:36:02.602961 kubelet[1617]: I0510 00:36:02.602497 1617 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:36:03.030858 kubelet[1617]: I0510 00:36:03.030810 1617 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:36:03.030858 kubelet[1617]: I0510 00:36:03.030845 1617 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:36:03.031182 kubelet[1617]: I0510 00:36:03.031162 1617 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:36:03.056092 kubelet[1617]: E0510 00:36:03.056043 1617 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.17:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:03.057049 kubelet[1617]: I0510 00:36:03.057024 1617 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:36:03.066308 kubelet[1617]: E0510 00:36:03.066248 1617 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:36:03.066308 kubelet[1617]: I0510 00:36:03.066295 1617 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:36:03.071534 kubelet[1617]: I0510 00:36:03.071483 1617 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:36:03.072532 kubelet[1617]: I0510 00:36:03.072480 1617 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:36:03.072731 kubelet[1617]: I0510 00:36:03.072521 1617 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:36:03.072731 kubelet[1617]: I0510 00:36:03.072724 1617 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:36:03.072731 kubelet[1617]: I0510 00:36:03.072736 1617 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:36:03.072934 kubelet[1617]: I0510 00:36:03.072865 1617 state_mem.go:36] "Initialized new in-memory state store" May 10 00:36:03.076809 kubelet[1617]: I0510 00:36:03.076778 1617 kubelet.go:446] "Attempting to sync node with API server" May 10 00:36:03.076809 kubelet[1617]: I0510 00:36:03.076800 1617 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:36:03.076809 kubelet[1617]: I0510 00:36:03.076819 1617 kubelet.go:352] "Adding apiserver pod source" May 10 00:36:03.076962 kubelet[1617]: I0510 00:36:03.076830 1617 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:36:03.094888 kubelet[1617]: I0510 00:36:03.094839 1617 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:36:03.095315 kubelet[1617]: I0510 00:36:03.095285 1617 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:36:03.102428 kubelet[1617]: W0510 00:36:03.102391 1617 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:36:03.110199 kubelet[1617]: I0510 00:36:03.110168 1617 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:36:03.110199 kubelet[1617]: I0510 00:36:03.110215 1617 server.go:1287] "Started kubelet" May 10 00:36:03.117000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:03.117000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:03.119593 kubelet[1617]: W0510 00:36:03.119512 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:03.119593 kubelet[1617]: W0510 00:36:03.119509 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:03.119593 kubelet[1617]: E0510 00:36:03.119551 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:03.119593 kubelet[1617]: E0510 00:36:03.119565 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:03.119760 kubelet[1617]: I0510 00:36:03.119625 1617 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:36:03.119760 kubelet[1617]: I0510 00:36:03.119622 1617 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:36:03.117000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00063d4d0 a1=c000c7f2a8 a2=c00063d4a0 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.119967 kubelet[1617]: I0510 00:36:03.119933 1617 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:36:03.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:03.120234 kubelet[1617]: I0510 00:36:03.120176 1617 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:36:03.118000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:03.118000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:03.118000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004257c0 a1=c000c7f2c0 a2=c00063d560 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.120523 kubelet[1617]: I0510 00:36:03.120471 1617 server.go:490] "Adding debug handlers to kubelet server" May 10 00:36:03.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:03.120654 kubelet[1617]: I0510 00:36:03.120586 1617 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:36:03.120711 kubelet[1617]: I0510 00:36:03.120695 1617 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:36:03.120894 kubelet[1617]: I0510 00:36:03.120872 1617 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:36:03.121391 kubelet[1617]: E0510 00:36:03.121368 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:03.121443 kubelet[1617]: I0510 00:36:03.121395 1617 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:36:03.121559 kubelet[1617]: I0510 00:36:03.121516 1617 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:36:03.121559 kubelet[1617]: I0510 00:36:03.121558 1617 reconciler.go:26] "Reconciler: start to sync state" May 10 00:36:03.122796 kubelet[1617]: E0510 00:36:03.122761 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.17:6443: connect: connection refused" interval="200ms" May 10 00:36:03.122884 kubelet[1617]: W0510 00:36:03.122822 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:03.122884 kubelet[1617]: E0510 00:36:03.122868 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:03.122000 audit[1630]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.122000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff20cae8e0 a2=0 a3=7fff20cae8cc items=0 ppid=1617 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:36:03.124367 kubelet[1617]: E0510 00:36:03.124102 1617 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:36:03.124367 kubelet[1617]: I0510 00:36:03.124217 1617 factory.go:221] Registration of the containerd container factory successfully May 10 00:36:03.124367 kubelet[1617]: I0510 00:36:03.124230 1617 factory.go:221] Registration of the systemd container factory successfully May 10 00:36:03.124367 kubelet[1617]: I0510 00:36:03.124291 1617 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:36:03.123000 audit[1631]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.123000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe39c873b0 a2=0 a3=7ffe39c8739c items=0 ppid=1617 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:36:03.126189 kubelet[1617]: E0510 00:36:03.124969 1617 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.17:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.17:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e03539c900685 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 00:36:03.110184581 +0000 UTC m=+0.580748589,LastTimestamp:2025-05-10 00:36:03.110184581 +0000 UTC m=+0.580748589,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 00:36:03.125000 audit[1633]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.125000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb2db1d50 a2=0 a3=7ffdb2db1d3c items=0 ppid=1617 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:03.130000 audit[1636]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.130000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff61919760 a2=0 a3=7fff6191974c items=0 ppid=1617 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:03.134626 kubelet[1617]: I0510 00:36:03.134599 1617 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:36:03.134626 kubelet[1617]: I0510 00:36:03.134615 1617 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:36:03.134626 kubelet[1617]: I0510 00:36:03.134629 1617 state_mem.go:36] "Initialized new in-memory state store" May 10 00:36:03.137000 audit[1643]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.137000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd47ae8050 a2=0 a3=7ffd47ae803c items=0 ppid=1617 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:36:03.139559 kubelet[1617]: I0510 00:36:03.139519 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:36:03.138000 audit[1644]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.138000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7684e7f0 a2=0 a3=7ffe7684e7dc items=0 ppid=1617 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:36:03.139000 audit[1645]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:03.139000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffccb14eea0 a2=0 a3=7ffccb14ee8c items=0 ppid=1617 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:36:03.141066 kubelet[1617]: I0510 00:36:03.141030 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:36:03.141101 kubelet[1617]: I0510 00:36:03.141071 1617 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:36:03.141101 kubelet[1617]: I0510 00:36:03.141094 1617 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:36:03.141143 kubelet[1617]: I0510 00:36:03.141103 1617 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:36:03.141169 kubelet[1617]: E0510 00:36:03.141156 1617 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:36:03.140000 audit[1647]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.140000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5048d1d0 a2=0 a3=7ffd5048d1bc items=0 ppid=1617 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:36:03.140000 audit[1648]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:03.142086 kubelet[1617]: W0510 00:36:03.142010 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:03.142086 kubelet[1617]: E0510 00:36:03.142061 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:03.140000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd2b6f5d0 a2=0 a3=7fffd2b6f5bc items=0 ppid=1617 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:36:03.140000 audit[1649]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:03.140000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd95714c0 a2=0 a3=7ffdd95714ac items=0 ppid=1617 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:36:03.141000 audit[1650]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:03.141000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd7be32800 a2=0 a3=7ffd7be327ec items=0 ppid=1617 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:36:03.142000 audit[1651]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:03.142000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdaebd7a70 a2=0 a3=7ffdaebd7a5c items=0 ppid=1617 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:36:03.222227 kubelet[1617]: E0510 00:36:03.222171 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:03.241411 kubelet[1617]: E0510 00:36:03.241353 1617 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:36:03.285813 kubelet[1617]: I0510 00:36:03.285724 1617 policy_none.go:49] "None policy: Start" May 10 00:36:03.285813 kubelet[1617]: I0510 00:36:03.285764 1617 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:36:03.285813 kubelet[1617]: I0510 00:36:03.285779 1617 state_mem.go:35] "Initializing new in-memory state store" May 10 00:36:03.292612 systemd[1]: Created slice kubepods.slice. May 10 00:36:03.297042 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:36:03.299535 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:36:03.309461 kubelet[1617]: I0510 00:36:03.309411 1617 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:36:03.307000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:03.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:03.307000 audit[1617]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000db5950 a1=c0009b07b0 a2=c000db5920 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:03.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:03.309876 kubelet[1617]: I0510 00:36:03.309474 1617 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:36:03.309876 kubelet[1617]: I0510 00:36:03.309567 1617 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:36:03.309876 kubelet[1617]: I0510 00:36:03.309578 1617 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:36:03.309876 kubelet[1617]: I0510 00:36:03.309806 1617 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:36:03.310620 kubelet[1617]: E0510 00:36:03.310598 1617 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:36:03.310673 kubelet[1617]: E0510 00:36:03.310650 1617 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 10 00:36:03.324253 kubelet[1617]: E0510 00:36:03.324177 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.17:6443: connect: connection refused" interval="400ms" May 10 00:36:03.411619 kubelet[1617]: I0510 00:36:03.411569 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:36:03.412046 kubelet[1617]: E0510 00:36:03.412017 1617 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.17:6443/api/v1/nodes\": dial tcp 10.0.0.17:6443: connect: connection refused" node="localhost" May 10 00:36:03.450784 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 10 00:36:03.464931 kubelet[1617]: E0510 00:36:03.464896 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:03.467927 systemd[1]: Created slice kubepods-burstable-podafcad43c6c557781b690662d79ca4313.slice. May 10 00:36:03.477897 kubelet[1617]: E0510 00:36:03.477848 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:03.480301 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 10 00:36:03.482007 kubelet[1617]: E0510 00:36:03.481967 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:03.524138 kubelet[1617]: I0510 00:36:03.523870 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/afcad43c6c557781b690662d79ca4313-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"afcad43c6c557781b690662d79ca4313\") " pod="kube-system/kube-apiserver-localhost" May 10 00:36:03.524269 kubelet[1617]: I0510 00:36:03.524171 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/afcad43c6c557781b690662d79ca4313-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"afcad43c6c557781b690662d79ca4313\") " pod="kube-system/kube-apiserver-localhost" May 10 00:36:03.524317 kubelet[1617]: I0510 00:36:03.524297 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:03.524351 kubelet[1617]: I0510 00:36:03.524324 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:03.524351 kubelet[1617]: I0510 00:36:03.524343 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/afcad43c6c557781b690662d79ca4313-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"afcad43c6c557781b690662d79ca4313\") " pod="kube-system/kube-apiserver-localhost" May 10 00:36:03.524441 kubelet[1617]: I0510 00:36:03.524367 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:03.524441 kubelet[1617]: I0510 00:36:03.524387 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:03.524508 kubelet[1617]: I0510 00:36:03.524467 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:03.524568 kubelet[1617]: I0510 00:36:03.524537 1617 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 10 00:36:03.613445 kubelet[1617]: I0510 00:36:03.613297 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:36:03.613933 kubelet[1617]: E0510 00:36:03.613607 1617 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.17:6443/api/v1/nodes\": dial tcp 10.0.0.17:6443: connect: connection refused" node="localhost" May 10 00:36:03.725070 kubelet[1617]: E0510 00:36:03.725011 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.17:6443: connect: connection refused" interval="800ms" May 10 00:36:03.766327 kubelet[1617]: E0510 00:36:03.766256 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:03.767009 env[1215]: time="2025-05-10T00:36:03.766938814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 10 00:36:03.779277 kubelet[1617]: E0510 00:36:03.779233 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:03.779835 env[1215]: time="2025-05-10T00:36:03.779795700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:afcad43c6c557781b690662d79ca4313,Namespace:kube-system,Attempt:0,}" May 10 00:36:03.783158 kubelet[1617]: E0510 00:36:03.783120 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:03.783664 env[1215]: time="2025-05-10T00:36:03.783620705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 10 00:36:03.951239 kubelet[1617]: W0510 00:36:03.951177 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:03.951239 kubelet[1617]: E0510 00:36:03.951238 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:04.014795 kubelet[1617]: I0510 00:36:04.014757 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:36:04.015141 kubelet[1617]: E0510 00:36:04.015083 1617 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.17:6443/api/v1/nodes\": dial tcp 10.0.0.17:6443: connect: connection refused" node="localhost" May 10 00:36:04.023680 kubelet[1617]: W0510 00:36:04.023612 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:04.023830 kubelet[1617]: E0510 00:36:04.023702 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:04.058912 kubelet[1617]: W0510 00:36:04.058853 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:04.059139 kubelet[1617]: E0510 00:36:04.058912 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:04.278600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1901345212.mount: Deactivated successfully. May 10 00:36:04.284342 env[1215]: time="2025-05-10T00:36:04.284295047Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.287872 env[1215]: time="2025-05-10T00:36:04.287821071Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.288997 env[1215]: time="2025-05-10T00:36:04.288974244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.289563 env[1215]: time="2025-05-10T00:36:04.289532771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.290470 env[1215]: time="2025-05-10T00:36:04.290443710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.292946 env[1215]: time="2025-05-10T00:36:04.292921007Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.294275 env[1215]: time="2025-05-10T00:36:04.294252013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.295419 env[1215]: time="2025-05-10T00:36:04.295392252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.296579 env[1215]: time="2025-05-10T00:36:04.296549453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.299622 env[1215]: time="2025-05-10T00:36:04.299586840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.300742 env[1215]: time="2025-05-10T00:36:04.300715246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.301923 env[1215]: time="2025-05-10T00:36:04.301889329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:04.319973 env[1215]: time="2025-05-10T00:36:04.319859175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:04.319973 env[1215]: time="2025-05-10T00:36:04.319909269Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:04.319973 env[1215]: time="2025-05-10T00:36:04.319923145Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:04.320218 env[1215]: time="2025-05-10T00:36:04.320064761Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e451c0639a171a698544a60bca3d261521f4c882402113823fc54ec64f3a94cf pid=1659 runtime=io.containerd.runc.v2 May 10 00:36:04.337423 systemd[1]: Started cri-containerd-e451c0639a171a698544a60bca3d261521f4c882402113823fc54ec64f3a94cf.scope. May 10 00:36:04.341842 env[1215]: time="2025-05-10T00:36:04.341621425Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:04.341842 env[1215]: time="2025-05-10T00:36:04.341654186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:04.341842 env[1215]: time="2025-05-10T00:36:04.341663323Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:04.341842 env[1215]: time="2025-05-10T00:36:04.341806422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/058c5e28191a7ab982cf70b085e7c90ca580e9de2e78f47f7bcd11483fd9fcac pid=1694 runtime=io.containerd.runc.v2 May 10 00:36:04.348552 env[1215]: time="2025-05-10T00:36:04.348487283Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:04.348653 env[1215]: time="2025-05-10T00:36:04.348558637Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:04.348653 env[1215]: time="2025-05-10T00:36:04.348580238Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:04.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.348000 audit: BPF prog-id=61 op=LOAD May 10 00:36:04.350471 env[1215]: time="2025-05-10T00:36:04.349493851Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5b2d993e5c11f868bb381612232811a36baca5f38294caf135ee11a24acb6bc pid=1695 runtime=io.containerd.runc.v2 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1659 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353163303633396131373161363938353434613630626361336432 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1659 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353163303633396131373161363938353434613630626361336432 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit: BPF prog-id=62 op=LOAD May 10 00:36:04.349000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000186540 items=0 ppid=1659 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353163303633396131373161363938353434613630626361336432 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit: BPF prog-id=63 op=LOAD May 10 00:36:04.349000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000186588 items=0 ppid=1659 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353163303633396131373161363938353434613630626361336432 May 10 00:36:04.349000 audit: BPF prog-id=63 op=UNLOAD May 10 00:36:04.349000 audit: BPF prog-id=62 op=UNLOAD May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.349000 audit: BPF prog-id=64 op=LOAD May 10 00:36:04.349000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000186998 items=0 ppid=1659 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353163303633396131373161363938353434613630626361336432 May 10 00:36:04.358819 systemd[1]: Started cri-containerd-058c5e28191a7ab982cf70b085e7c90ca580e9de2e78f47f7bcd11483fd9fcac.scope. May 10 00:36:04.363527 systemd[1]: Started cri-containerd-b5b2d993e5c11f868bb381612232811a36baca5f38294caf135ee11a24acb6bc.scope. May 10 00:36:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit: BPF prog-id=65 op=LOAD May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1694 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386335653238313931613761623938326366373062303835653763 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1694 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386335653238313931613761623938326366373062303835653763 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit: BPF prog-id=66 op=LOAD May 10 00:36:04.371000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000285b10 items=0 ppid=1694 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386335653238313931613761623938326366373062303835653763 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit: BPF prog-id=67 op=LOAD May 10 00:36:04.371000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000285b58 items=0 ppid=1694 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386335653238313931613761623938326366373062303835653763 May 10 00:36:04.371000 audit: BPF prog-id=67 op=UNLOAD May 10 00:36:04.371000 audit: BPF prog-id=66 op=UNLOAD May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.371000 audit: BPF prog-id=68 op=LOAD May 10 00:36:04.371000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000285f68 items=0 ppid=1694 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386335653238313931613761623938326366373062303835653763 May 10 00:36:04.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit: BPF prog-id=69 op=LOAD May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1695 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623264393933653563313166383638626233383136313232333238 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1695 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623264393933653563313166383638626233383136313232333238 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit: BPF prog-id=70 op=LOAD May 10 00:36:04.374000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000383d10 items=0 ppid=1695 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623264393933653563313166383638626233383136313232333238 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit: BPF prog-id=71 op=LOAD May 10 00:36:04.374000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000383d58 items=0 ppid=1695 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623264393933653563313166383638626233383136313232333238 May 10 00:36:04.374000 audit: BPF prog-id=71 op=UNLOAD May 10 00:36:04.374000 audit: BPF prog-id=70 op=UNLOAD May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.374000 audit: BPF prog-id=72 op=LOAD May 10 00:36:04.374000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f8168 items=0 ppid=1695 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623264393933653563313166383638626233383136313232333238 May 10 00:36:04.378184 env[1215]: time="2025-05-10T00:36:04.378137308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"e451c0639a171a698544a60bca3d261521f4c882402113823fc54ec64f3a94cf\"" May 10 00:36:04.379107 kubelet[1617]: E0510 00:36:04.379057 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:04.381091 env[1215]: time="2025-05-10T00:36:04.381051434Z" level=info msg="CreateContainer within sandbox \"e451c0639a171a698544a60bca3d261521f4c882402113823fc54ec64f3a94cf\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:36:04.404831 env[1215]: time="2025-05-10T00:36:04.404783248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:afcad43c6c557781b690662d79ca4313,Namespace:kube-system,Attempt:0,} returns sandbox id \"058c5e28191a7ab982cf70b085e7c90ca580e9de2e78f47f7bcd11483fd9fcac\"" May 10 00:36:04.405136 env[1215]: time="2025-05-10T00:36:04.404931807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"b5b2d993e5c11f868bb381612232811a36baca5f38294caf135ee11a24acb6bc\"" May 10 00:36:04.407041 kubelet[1617]: E0510 00:36:04.406761 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:04.407041 kubelet[1617]: E0510 00:36:04.406853 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:04.408119 env[1215]: time="2025-05-10T00:36:04.408097044Z" level=info msg="CreateContainer within sandbox \"b5b2d993e5c11f868bb381612232811a36baca5f38294caf135ee11a24acb6bc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:36:04.408897 env[1215]: time="2025-05-10T00:36:04.408834277Z" level=info msg="CreateContainer within sandbox \"058c5e28191a7ab982cf70b085e7c90ca580e9de2e78f47f7bcd11483fd9fcac\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:36:04.526177 kubelet[1617]: E0510 00:36:04.526123 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.17:6443: connect: connection refused" interval="1.6s" May 10 00:36:04.538973 kubelet[1617]: W0510 00:36:04.538802 1617 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.17:6443: connect: connection refused May 10 00:36:04.538973 kubelet[1617]: E0510 00:36:04.538881 1617 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.17:6443: connect: connection refused" logger="UnhandledError" May 10 00:36:04.554585 env[1215]: time="2025-05-10T00:36:04.554509732Z" level=info msg="CreateContainer within sandbox \"e451c0639a171a698544a60bca3d261521f4c882402113823fc54ec64f3a94cf\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2310347e70882b4cd107b8d8f7c355bc0c9ea66cd9209c2f0d3c4c246531d59e\"" May 10 00:36:04.555329 env[1215]: time="2025-05-10T00:36:04.555284906Z" level=info msg="StartContainer for \"2310347e70882b4cd107b8d8f7c355bc0c9ea66cd9209c2f0d3c4c246531d59e\"" May 10 00:36:04.561347 env[1215]: time="2025-05-10T00:36:04.561295691Z" level=info msg="CreateContainer within sandbox \"058c5e28191a7ab982cf70b085e7c90ca580e9de2e78f47f7bcd11483fd9fcac\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e182ce53216fb933869e697a8f301ba7305390399abe956a58a55132f3000b65\"" May 10 00:36:04.561900 env[1215]: time="2025-05-10T00:36:04.561847155Z" level=info msg="StartContainer for \"e182ce53216fb933869e697a8f301ba7305390399abe956a58a55132f3000b65\"" May 10 00:36:04.564874 env[1215]: time="2025-05-10T00:36:04.564825612Z" level=info msg="CreateContainer within sandbox \"b5b2d993e5c11f868bb381612232811a36baca5f38294caf135ee11a24acb6bc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ae425a0020c937cb68e2e4fc9cee3ec834a060b153068f4bd850f457b95d278e\"" May 10 00:36:04.565303 env[1215]: time="2025-05-10T00:36:04.565275816Z" level=info msg="StartContainer for \"ae425a0020c937cb68e2e4fc9cee3ec834a060b153068f4bd850f457b95d278e\"" May 10 00:36:04.572481 systemd[1]: Started cri-containerd-2310347e70882b4cd107b8d8f7c355bc0c9ea66cd9209c2f0d3c4c246531d59e.scope. May 10 00:36:04.581361 systemd[1]: Started cri-containerd-e182ce53216fb933869e697a8f301ba7305390399abe956a58a55132f3000b65.scope. May 10 00:36:04.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.585000 audit: BPF prog-id=73 op=LOAD May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1659 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313033343765373038383262346364313037623864386637633335 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=1659 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313033343765373038383262346364313037623864386637633335 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit: BPF prog-id=74 op=LOAD May 10 00:36:04.586000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00027f450 items=0 ppid=1659 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313033343765373038383262346364313037623864386637633335 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit: BPF prog-id=75 op=LOAD May 10 00:36:04.586000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00027f498 items=0 ppid=1659 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313033343765373038383262346364313037623864386637633335 May 10 00:36:04.586000 audit: BPF prog-id=75 op=UNLOAD May 10 00:36:04.586000 audit: BPF prog-id=74 op=UNLOAD May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.586000 audit: BPF prog-id=76 op=LOAD May 10 00:36:04.586000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00027f8a8 items=0 ppid=1659 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313033343765373038383262346364313037623864386637633335 May 10 00:36:04.595752 systemd[1]: Started cri-containerd-ae425a0020c937cb68e2e4fc9cee3ec834a060b153068f4bd850f457b95d278e.scope. May 10 00:36:04.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit: BPF prog-id=77 op=LOAD May 10 00:36:04.598000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1694 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383263653533323136666239333338363965363937613866333031 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1694 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383263653533323136666239333338363965363937613866333031 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.598000 audit: BPF prog-id=78 op=LOAD May 10 00:36:04.598000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000348d10 items=0 ppid=1694 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383263653533323136666239333338363965363937613866333031 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.599000 audit: BPF prog-id=79 op=LOAD May 10 00:36:04.599000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000348d58 items=0 ppid=1694 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383263653533323136666239333338363965363937613866333031 May 10 00:36:04.600000 audit: BPF prog-id=79 op=UNLOAD May 10 00:36:04.600000 audit: BPF prog-id=78 op=UNLOAD May 10 00:36:04.600000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.600000 audit: BPF prog-id=80 op=LOAD May 10 00:36:04.600000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000349168 items=0 ppid=1694 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383263653533323136666239333338363965363937613866333031 May 10 00:36:04.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.611000 audit: BPF prog-id=81 op=LOAD May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343235613030323063393337636236386532653466633963656533 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343235613030323063393337636236386532653466633963656533 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit: BPF prog-id=82 op=LOAD May 10 00:36:04.612000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00029f4e0 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343235613030323063393337636236386532653466633963656533 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit: BPF prog-id=83 op=LOAD May 10 00:36:04.612000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00029f528 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343235613030323063393337636236386532653466633963656533 May 10 00:36:04.612000 audit: BPF prog-id=83 op=UNLOAD May 10 00:36:04.612000 audit: BPF prog-id=82 op=UNLOAD May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:04.612000 audit: BPF prog-id=84 op=LOAD May 10 00:36:04.612000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00029f938 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:04.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343235613030323063393337636236386532653466633963656533 May 10 00:36:04.620888 env[1215]: time="2025-05-10T00:36:04.620842003Z" level=info msg="StartContainer for \"2310347e70882b4cd107b8d8f7c355bc0c9ea66cd9209c2f0d3c4c246531d59e\" returns successfully" May 10 00:36:04.681249 env[1215]: time="2025-05-10T00:36:04.681170472Z" level=info msg="StartContainer for \"e182ce53216fb933869e697a8f301ba7305390399abe956a58a55132f3000b65\" returns successfully" May 10 00:36:04.718016 env[1215]: time="2025-05-10T00:36:04.717916357Z" level=info msg="StartContainer for \"ae425a0020c937cb68e2e4fc9cee3ec834a060b153068f4bd850f457b95d278e\" returns successfully" May 10 00:36:04.817283 kubelet[1617]: I0510 00:36:04.817148 1617 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:36:05.147366 kubelet[1617]: E0510 00:36:05.147328 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:05.147532 kubelet[1617]: E0510 00:36:05.147441 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:05.148879 kubelet[1617]: E0510 00:36:05.148853 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:05.148967 kubelet[1617]: E0510 00:36:05.148931 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:05.150195 kubelet[1617]: E0510 00:36:05.150168 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:05.150269 kubelet[1617]: E0510 00:36:05.150246 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:05.448000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.448000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0008443f0 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:05.448000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:05.449000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.449000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00037c000 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:05.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:05.539000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.539000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c003b22180 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:36:05.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:36:05.539000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.539000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c000356820 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:36:05.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:36:05.539000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.539000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006d110b0 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:36:05.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:36:05.547000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.547000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00612fd10 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:36:05.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:36:05.569000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.569000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c009496aa0 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:36:05.569000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:36:05.569000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:05.569000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005d62180 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:36:05.569000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:36:05.797133 kubelet[1617]: I0510 00:36:05.797015 1617 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 10 00:36:05.797133 kubelet[1617]: E0510 00:36:05.797048 1617 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 10 00:36:05.806971 kubelet[1617]: E0510 00:36:05.806934 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:05.907089 kubelet[1617]: E0510 00:36:05.907021 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:06.007794 kubelet[1617]: E0510 00:36:06.007748 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:06.108154 kubelet[1617]: E0510 00:36:06.108052 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:06.152620 kubelet[1617]: E0510 00:36:06.152596 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:06.152707 kubelet[1617]: E0510 00:36:06.152696 1617 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:36:06.152787 kubelet[1617]: E0510 00:36:06.152744 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:06.152942 kubelet[1617]: E0510 00:36:06.152802 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:06.209028 kubelet[1617]: E0510 00:36:06.208860 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:06.309481 kubelet[1617]: E0510 00:36:06.309389 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:06.410555 kubelet[1617]: E0510 00:36:06.410498 1617 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:06.522092 kubelet[1617]: I0510 00:36:06.522038 1617 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 10 00:36:06.527365 kubelet[1617]: E0510 00:36:06.527324 1617 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 10 00:36:06.527365 kubelet[1617]: I0510 00:36:06.527359 1617 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 10 00:36:06.529051 kubelet[1617]: E0510 00:36:06.528999 1617 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 10 00:36:06.529051 kubelet[1617]: I0510 00:36:06.529028 1617 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 10 00:36:06.530597 kubelet[1617]: E0510 00:36:06.530567 1617 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 10 00:36:07.079115 kubelet[1617]: I0510 00:36:07.079063 1617 apiserver.go:52] "Watching apiserver" May 10 00:36:07.122048 kubelet[1617]: I0510 00:36:07.121998 1617 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:36:07.477803 systemd[1]: Reloading. May 10 00:36:07.615609 /usr/lib/systemd/system-generators/torcx-generator[1916]: time="2025-05-10T00:36:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:36:07.615639 /usr/lib/systemd/system-generators/torcx-generator[1916]: time="2025-05-10T00:36:07Z" level=info msg="torcx already run" May 10 00:36:07.668074 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:36:07.668090 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:36:07.685040 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:36:07.762444 kernel: kauditd_printk_skb: 585 callbacks suppressed May 10 00:36:07.762558 kernel: audit: type=1400 audit(1746837367.750:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762587 kernel: audit: type=1400 audit(1746837367.750:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762607 kernel: audit: type=1400 audit(1746837367.750:562): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.769403 kernel: audit: type=1400 audit(1746837367.750:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.769505 kernel: audit: type=1400 audit(1746837367.750:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.769534 kernel: audit: type=1400 audit(1746837367.750:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.772359 kernel: audit: type=1400 audit(1746837367.750:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.775497 kernel: audit: type=1400 audit(1746837367.750:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.781544 kernel: audit: type=1400 audit(1746837367.750:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.781617 kernel: audit: type=1400 audit(1746837367.754:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.754000 audit: BPF prog-id=85 op=LOAD May 10 00:36:07.754000 audit: BPF prog-id=46 op=UNLOAD May 10 00:36:07.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.760000 audit: BPF prog-id=86 op=LOAD May 10 00:36:07.760000 audit: BPF prog-id=47 op=UNLOAD May 10 00:36:07.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.767000 audit: BPF prog-id=87 op=LOAD May 10 00:36:07.767000 audit: BPF prog-id=73 op=UNLOAD May 10 00:36:07.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.773000 audit: BPF prog-id=88 op=LOAD May 10 00:36:07.773000 audit: BPF prog-id=69 op=UNLOAD May 10 00:36:07.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.776000 audit: BPF prog-id=89 op=LOAD May 10 00:36:07.776000 audit: BPF prog-id=81 op=UNLOAD May 10 00:36:07.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.779000 audit: BPF prog-id=90 op=LOAD May 10 00:36:07.779000 audit: BPF prog-id=48 op=UNLOAD May 10 00:36:07.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit: BPF prog-id=91 op=LOAD May 10 00:36:07.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit: BPF prog-id=92 op=LOAD May 10 00:36:07.783000 audit: BPF prog-id=49 op=UNLOAD May 10 00:36:07.783000 audit: BPF prog-id=50 op=UNLOAD May 10 00:36:07.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit: BPF prog-id=93 op=LOAD May 10 00:36:07.784000 audit: BPF prog-id=65 op=UNLOAD May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit: BPF prog-id=94 op=LOAD May 10 00:36:07.784000 audit: BPF prog-id=51 op=UNLOAD May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit: BPF prog-id=95 op=LOAD May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.784000 audit: BPF prog-id=96 op=LOAD May 10 00:36:07.784000 audit: BPF prog-id=52 op=UNLOAD May 10 00:36:07.784000 audit: BPF prog-id=53 op=UNLOAD May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit: BPF prog-id=97 op=LOAD May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.785000 audit: BPF prog-id=98 op=LOAD May 10 00:36:07.785000 audit: BPF prog-id=54 op=UNLOAD May 10 00:36:07.785000 audit: BPF prog-id=55 op=UNLOAD May 10 00:36:07.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.786000 audit: BPF prog-id=99 op=LOAD May 10 00:36:07.786000 audit: BPF prog-id=61 op=UNLOAD May 10 00:36:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.787000 audit: BPF prog-id=100 op=LOAD May 10 00:36:07.787000 audit: BPF prog-id=77 op=UNLOAD May 10 00:36:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.788000 audit: BPF prog-id=101 op=LOAD May 10 00:36:07.788000 audit: BPF prog-id=56 op=UNLOAD May 10 00:36:07.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.789000 audit: BPF prog-id=102 op=LOAD May 10 00:36:07.789000 audit: BPF prog-id=57 op=UNLOAD May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit: BPF prog-id=103 op=LOAD May 10 00:36:07.791000 audit: BPF prog-id=58 op=UNLOAD May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit: BPF prog-id=104 op=LOAD May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:07.791000 audit: BPF prog-id=105 op=LOAD May 10 00:36:07.791000 audit: BPF prog-id=59 op=UNLOAD May 10 00:36:07.791000 audit: BPF prog-id=60 op=UNLOAD May 10 00:36:07.804440 systemd[1]: Stopping kubelet.service... May 10 00:36:07.833069 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:36:07.833267 systemd[1]: Stopped kubelet.service. May 10 00:36:07.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:07.835889 systemd[1]: Starting kubelet.service... May 10 00:36:07.927454 systemd[1]: Started kubelet.service. May 10 00:36:07.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:07.992779 kubelet[1961]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:36:07.992779 kubelet[1961]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:36:07.992779 kubelet[1961]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:36:07.993314 kubelet[1961]: I0510 00:36:07.992808 1961 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:36:07.999150 kubelet[1961]: I0510 00:36:07.999103 1961 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:36:07.999150 kubelet[1961]: I0510 00:36:07.999136 1961 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:36:07.999409 kubelet[1961]: I0510 00:36:07.999386 1961 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:36:08.000498 kubelet[1961]: I0510 00:36:08.000470 1961 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:36:08.005846 kubelet[1961]: I0510 00:36:08.005804 1961 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:36:08.009409 kubelet[1961]: E0510 00:36:08.009379 1961 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:36:08.009409 kubelet[1961]: I0510 00:36:08.009409 1961 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:36:08.013715 kubelet[1961]: I0510 00:36:08.013607 1961 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:36:08.013880 kubelet[1961]: I0510 00:36:08.013836 1961 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:36:08.014137 kubelet[1961]: I0510 00:36:08.013877 1961 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:36:08.014137 kubelet[1961]: I0510 00:36:08.014116 1961 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:36:08.014137 kubelet[1961]: I0510 00:36:08.014126 1961 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:36:08.014732 kubelet[1961]: I0510 00:36:08.014171 1961 state_mem.go:36] "Initialized new in-memory state store" May 10 00:36:08.014732 kubelet[1961]: I0510 00:36:08.014321 1961 kubelet.go:446] "Attempting to sync node with API server" May 10 00:36:08.014732 kubelet[1961]: I0510 00:36:08.014335 1961 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:36:08.014732 kubelet[1961]: I0510 00:36:08.014353 1961 kubelet.go:352] "Adding apiserver pod source" May 10 00:36:08.014732 kubelet[1961]: I0510 00:36:08.014364 1961 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:36:08.018140 kubelet[1961]: I0510 00:36:08.018110 1961 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:36:08.019073 kubelet[1961]: I0510 00:36:08.019051 1961 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:36:08.022537 kubelet[1961]: I0510 00:36:08.020557 1961 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:36:08.022537 kubelet[1961]: I0510 00:36:08.020606 1961 server.go:1287] "Started kubelet" May 10 00:36:08.022537 kubelet[1961]: I0510 00:36:08.022328 1961 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:36:08.022537 kubelet[1961]: I0510 00:36:08.022357 1961 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:36:08.022537 kubelet[1961]: I0510 00:36:08.022384 1961 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:36:08.020000 audit[1961]: AVC avc: denied { mac_admin } for pid=1961 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:08.020000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:08.020000 audit[1961]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c17530 a1=c000c247c8 a2=c000c17500 a3=25 items=0 ppid=1 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:08.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:08.020000 audit[1961]: AVC avc: denied { mac_admin } for pid=1961 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:08.020000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:08.020000 audit[1961]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c08660 a1=c000c247e0 a2=c000c175c0 a3=25 items=0 ppid=1 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:08.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:08.025509 kubelet[1961]: I0510 00:36:08.024407 1961 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:36:08.025509 kubelet[1961]: I0510 00:36:08.024634 1961 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:36:08.025842 kubelet[1961]: I0510 00:36:08.025815 1961 server.go:490] "Adding debug handlers to kubelet server" May 10 00:36:08.026634 kubelet[1961]: I0510 00:36:08.026601 1961 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:36:08.026786 kubelet[1961]: E0510 00:36:08.026760 1961 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:36:08.026862 kubelet[1961]: I0510 00:36:08.026811 1961 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:36:08.026898 kubelet[1961]: I0510 00:36:08.026857 1961 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:36:08.026964 kubelet[1961]: I0510 00:36:08.026941 1961 reconciler.go:26] "Reconciler: start to sync state" May 10 00:36:08.027053 kubelet[1961]: I0510 00:36:08.027033 1961 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:36:08.032836 kubelet[1961]: I0510 00:36:08.032789 1961 factory.go:221] Registration of the systemd container factory successfully May 10 00:36:08.033058 kubelet[1961]: I0510 00:36:08.032995 1961 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:36:08.035130 kubelet[1961]: I0510 00:36:08.035098 1961 factory.go:221] Registration of the containerd container factory successfully May 10 00:36:08.036293 kubelet[1961]: E0510 00:36:08.036264 1961 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:36:08.044183 kubelet[1961]: I0510 00:36:08.044134 1961 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:36:08.045151 kubelet[1961]: I0510 00:36:08.045128 1961 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:36:08.045196 kubelet[1961]: I0510 00:36:08.045160 1961 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:36:08.045196 kubelet[1961]: I0510 00:36:08.045184 1961 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:36:08.045255 kubelet[1961]: I0510 00:36:08.045198 1961 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:36:08.045292 kubelet[1961]: E0510 00:36:08.045260 1961 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:36:08.072620 kubelet[1961]: I0510 00:36:08.072588 1961 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:36:08.072620 kubelet[1961]: I0510 00:36:08.072609 1961 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:36:08.072843 kubelet[1961]: I0510 00:36:08.072631 1961 state_mem.go:36] "Initialized new in-memory state store" May 10 00:36:08.072843 kubelet[1961]: I0510 00:36:08.072826 1961 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:36:08.072896 kubelet[1961]: I0510 00:36:08.072836 1961 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:36:08.072896 kubelet[1961]: I0510 00:36:08.072855 1961 policy_none.go:49] "None policy: Start" May 10 00:36:08.073032 kubelet[1961]: I0510 00:36:08.072904 1961 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:36:08.073032 kubelet[1961]: I0510 00:36:08.072923 1961 state_mem.go:35] "Initializing new in-memory state store" May 10 00:36:08.073727 kubelet[1961]: I0510 00:36:08.073120 1961 state_mem.go:75] "Updated machine memory state" May 10 00:36:08.079123 kubelet[1961]: I0510 00:36:08.079079 1961 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:36:08.079123 kubelet[1961]: I0510 00:36:08.079153 1961 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:36:08.077000 audit[1961]: AVC avc: denied { mac_admin } for pid=1961 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:08.077000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:36:08.077000 audit[1961]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00112a030 a1=c0011242d0 a2=c00112a000 a3=25 items=0 ppid=1 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:08.077000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:36:08.080085 kubelet[1961]: I0510 00:36:08.079295 1961 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:36:08.080085 kubelet[1961]: I0510 00:36:08.079307 1961 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:36:08.080085 kubelet[1961]: I0510 00:36:08.079518 1961 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:36:08.080961 kubelet[1961]: E0510 00:36:08.080929 1961 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:36:08.146298 kubelet[1961]: I0510 00:36:08.146238 1961 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 10 00:36:08.146585 kubelet[1961]: I0510 00:36:08.146238 1961 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 10 00:36:08.146769 kubelet[1961]: I0510 00:36:08.146351 1961 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 10 00:36:08.184170 kubelet[1961]: I0510 00:36:08.184141 1961 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:36:08.227669 kubelet[1961]: I0510 00:36:08.227589 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:08.227669 kubelet[1961]: I0510 00:36:08.227647 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 10 00:36:08.227669 kubelet[1961]: I0510 00:36:08.227678 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/afcad43c6c557781b690662d79ca4313-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"afcad43c6c557781b690662d79ca4313\") " pod="kube-system/kube-apiserver-localhost" May 10 00:36:08.227976 kubelet[1961]: I0510 00:36:08.227723 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/afcad43c6c557781b690662d79ca4313-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"afcad43c6c557781b690662d79ca4313\") " pod="kube-system/kube-apiserver-localhost" May 10 00:36:08.227976 kubelet[1961]: I0510 00:36:08.227744 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:08.227976 kubelet[1961]: I0510 00:36:08.227761 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:08.227976 kubelet[1961]: I0510 00:36:08.227775 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/afcad43c6c557781b690662d79ca4313-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"afcad43c6c557781b690662d79ca4313\") " pod="kube-system/kube-apiserver-localhost" May 10 00:36:08.227976 kubelet[1961]: I0510 00:36:08.227791 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:08.228146 kubelet[1961]: I0510 00:36:08.227808 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:36:08.242154 kubelet[1961]: I0510 00:36:08.242111 1961 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 10 00:36:08.242292 kubelet[1961]: I0510 00:36:08.242205 1961 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 10 00:36:08.508099 kubelet[1961]: E0510 00:36:08.508061 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:08.541323 kubelet[1961]: E0510 00:36:08.541284 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:08.541482 kubelet[1961]: E0510 00:36:08.541346 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:09.019636 kubelet[1961]: I0510 00:36:09.019585 1961 apiserver.go:52] "Watching apiserver" May 10 00:36:09.027481 kubelet[1961]: I0510 00:36:09.027427 1961 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:36:09.055567 kubelet[1961]: E0510 00:36:09.055539 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:09.055802 kubelet[1961]: E0510 00:36:09.055567 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:09.055902 kubelet[1961]: E0510 00:36:09.055574 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:09.077254 kubelet[1961]: I0510 00:36:09.077189 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.07714857 podStartE2EDuration="1.07714857s" podCreationTimestamp="2025-05-10 00:36:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:36:09.076932134 +0000 UTC m=+1.144679352" watchObservedRunningTime="2025-05-10 00:36:09.07714857 +0000 UTC m=+1.144895778" May 10 00:36:09.084644 kubelet[1961]: I0510 00:36:09.084567 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.084539744 podStartE2EDuration="1.084539744s" podCreationTimestamp="2025-05-10 00:36:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:36:09.08452697 +0000 UTC m=+1.152274188" watchObservedRunningTime="2025-05-10 00:36:09.084539744 +0000 UTC m=+1.152286952" May 10 00:36:09.100337 kubelet[1961]: I0510 00:36:09.100254 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.100231156 podStartE2EDuration="1.100231156s" podCreationTimestamp="2025-05-10 00:36:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:36:09.091405692 +0000 UTC m=+1.159152900" watchObservedRunningTime="2025-05-10 00:36:09.100231156 +0000 UTC m=+1.167978385" May 10 00:36:10.060729 kubelet[1961]: E0510 00:36:10.060618 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:10.061143 kubelet[1961]: E0510 00:36:10.060996 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:11.061887 kubelet[1961]: E0510 00:36:11.061843 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:11.169000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:36:11.169000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00082c680 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:11.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:12.368000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:12.368000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003e9dc0 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:12.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:12.370000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:12.370000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003e9e60 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:12.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:12.370000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:12.370000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003e9e80 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:12.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:12.371000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:36:12.371000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012c4260 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:36:12.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:36:12.689772 kubelet[1961]: I0510 00:36:12.689730 1961 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:36:12.690312 kubelet[1961]: I0510 00:36:12.690135 1961 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:36:12.690343 env[1215]: time="2025-05-10T00:36:12.689977382Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:36:13.091000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:13.092550 sudo[1351]: pam_unix(sudo:session): session closed for user root May 10 00:36:13.093669 kernel: kauditd_printk_skb: 273 callbacks suppressed May 10 00:36:13.093888 kernel: audit: type=1106 audit(1746837373.091:809): pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:13.094351 sshd[1348]: pam_unix(sshd:session): session closed for user core May 10 00:36:13.097028 systemd[1]: sshd@6-10.0.0.17:22-10.0.0.1:44062.service: Deactivated successfully. May 10 00:36:13.097981 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:36:13.098149 systemd[1]: session-7.scope: Consumed 4.262s CPU time. May 10 00:36:13.092000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:13.099085 systemd-logind[1205]: Session 7 logged out. Waiting for processes to exit. May 10 00:36:13.100014 systemd-logind[1205]: Removed session 7. May 10 00:36:13.101593 kernel: audit: type=1104 audit(1746837373.092:810): pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:36:13.101746 kernel: audit: type=1106 audit(1746837373.094:811): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:13.094000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:13.106105 kernel: audit: type=1104 audit(1746837373.094:812): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:13.094000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:13.109791 kernel: audit: type=1131 audit(1746837373.096:813): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.17:22-10.0.0.1:44062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:13.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.17:22-10.0.0.1:44062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:13.740921 systemd[1]: Created slice kubepods-besteffort-pod4c228d19_c6bc_4bb2_b3ff_122d3061dccb.slice. May 10 00:36:13.763793 kubelet[1961]: I0510 00:36:13.763737 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4c228d19-c6bc-4bb2-b3ff-122d3061dccb-xtables-lock\") pod \"kube-proxy-q8z4j\" (UID: \"4c228d19-c6bc-4bb2-b3ff-122d3061dccb\") " pod="kube-system/kube-proxy-q8z4j" May 10 00:36:13.763793 kubelet[1961]: I0510 00:36:13.763783 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4c228d19-c6bc-4bb2-b3ff-122d3061dccb-lib-modules\") pod \"kube-proxy-q8z4j\" (UID: \"4c228d19-c6bc-4bb2-b3ff-122d3061dccb\") " pod="kube-system/kube-proxy-q8z4j" May 10 00:36:13.764214 kubelet[1961]: I0510 00:36:13.763875 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4c228d19-c6bc-4bb2-b3ff-122d3061dccb-kube-proxy\") pod \"kube-proxy-q8z4j\" (UID: \"4c228d19-c6bc-4bb2-b3ff-122d3061dccb\") " pod="kube-system/kube-proxy-q8z4j" May 10 00:36:13.764214 kubelet[1961]: I0510 00:36:13.763904 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5p8g\" (UniqueName: \"kubernetes.io/projected/4c228d19-c6bc-4bb2-b3ff-122d3061dccb-kube-api-access-z5p8g\") pod \"kube-proxy-q8z4j\" (UID: \"4c228d19-c6bc-4bb2-b3ff-122d3061dccb\") " pod="kube-system/kube-proxy-q8z4j" May 10 00:36:13.800972 systemd[1]: Created slice kubepods-besteffort-pod4fab5bb2_6f8a_4afd_b7d0_ad38c5fc4752.slice. May 10 00:36:13.864594 kubelet[1961]: I0510 00:36:13.864529 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bs9t6\" (UniqueName: \"kubernetes.io/projected/4fab5bb2-6f8a-4afd-b7d0-ad38c5fc4752-kube-api-access-bs9t6\") pod \"tigera-operator-789496d6f5-zhcj9\" (UID: \"4fab5bb2-6f8a-4afd-b7d0-ad38c5fc4752\") " pod="tigera-operator/tigera-operator-789496d6f5-zhcj9" May 10 00:36:13.864594 kubelet[1961]: I0510 00:36:13.864589 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4fab5bb2-6f8a-4afd-b7d0-ad38c5fc4752-var-lib-calico\") pod \"tigera-operator-789496d6f5-zhcj9\" (UID: \"4fab5bb2-6f8a-4afd-b7d0-ad38c5fc4752\") " pod="tigera-operator/tigera-operator-789496d6f5-zhcj9" May 10 00:36:13.871518 kubelet[1961]: I0510 00:36:13.871484 1961 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:36:14.050766 kubelet[1961]: E0510 00:36:14.050635 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:14.051429 env[1215]: time="2025-05-10T00:36:14.051378991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q8z4j,Uid:4c228d19-c6bc-4bb2-b3ff-122d3061dccb,Namespace:kube-system,Attempt:0,}" May 10 00:36:14.070546 env[1215]: time="2025-05-10T00:36:14.070459393Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:14.070546 env[1215]: time="2025-05-10T00:36:14.070500281Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:14.070546 env[1215]: time="2025-05-10T00:36:14.070512805Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:14.070792 env[1215]: time="2025-05-10T00:36:14.070659155Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/512370b1a2ba15cde2f7682f3aef4724c730ffdf45d6030cc34c11f3fa8d4480 pid=2058 runtime=io.containerd.runc.v2 May 10 00:36:14.083933 systemd[1]: Started cri-containerd-512370b1a2ba15cde2f7682f3aef4724c730ffdf45d6030cc34c11f3fa8d4480.scope. May 10 00:36:14.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104514 env[1215]: time="2025-05-10T00:36:14.104466515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-zhcj9,Uid:4fab5bb2-6f8a-4afd-b7d0-ad38c5fc4752,Namespace:tigera-operator,Attempt:0,}" May 10 00:36:14.104620 kernel: audit: type=1400 audit(1746837374.097:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104660 kernel: audit: type=1400 audit(1746837374.097:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104680 kernel: audit: type=1400 audit(1746837374.097:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.112466 kernel: audit: type=1400 audit(1746837374.097:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.112510 kernel: audit: type=1400 audit(1746837374.097:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.103000 audit: BPF prog-id=106 op=LOAD May 10 00:36:14.104000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323337306231613262613135636465326637363832663361656634 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323337306231613262613135636465326637363832663361656634 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.104000 audit: BPF prog-id=107 op=LOAD May 10 00:36:14.104000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009afa0 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323337306231613262613135636465326637363832663361656634 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.107000 audit: BPF prog-id=108 op=LOAD May 10 00:36:14.107000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009afe8 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323337306231613262613135636465326637363832663361656634 May 10 00:36:14.111000 audit: BPF prog-id=108 op=UNLOAD May 10 00:36:14.111000 audit: BPF prog-id=107 op=UNLOAD May 10 00:36:14.111000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.111000 audit: BPF prog-id=109 op=LOAD May 10 00:36:14.111000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b3f8 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323337306231613262613135636465326637363832663361656634 May 10 00:36:14.127183 env[1215]: time="2025-05-10T00:36:14.127056558Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:14.127183 env[1215]: time="2025-05-10T00:36:14.127106985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:14.127589 env[1215]: time="2025-05-10T00:36:14.127116823Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:14.127773 env[1215]: time="2025-05-10T00:36:14.127729785Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a15fe2f6f63331af9f8c9d1185bb7d8d55d4d44cd3e43ffe1012ce1ed9657e8 pid=2093 runtime=io.containerd.runc.v2 May 10 00:36:14.130944 env[1215]: time="2025-05-10T00:36:14.130912350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q8z4j,Uid:4c228d19-c6bc-4bb2-b3ff-122d3061dccb,Namespace:kube-system,Attempt:0,} returns sandbox id \"512370b1a2ba15cde2f7682f3aef4724c730ffdf45d6030cc34c11f3fa8d4480\"" May 10 00:36:14.132332 kubelet[1961]: E0510 00:36:14.131752 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:14.136177 env[1215]: time="2025-05-10T00:36:14.136124486Z" level=info msg="CreateContainer within sandbox \"512370b1a2ba15cde2f7682f3aef4724c730ffdf45d6030cc34c11f3fa8d4480\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:36:14.140935 systemd[1]: Started cri-containerd-6a15fe2f6f63331af9f8c9d1185bb7d8d55d4d44cd3e43ffe1012ce1ed9657e8.scope. May 10 00:36:14.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.155000 audit: BPF prog-id=110 op=LOAD May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2093 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313566653266366636333333316166396638633964313138356262 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2093 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313566653266366636333333316166396638633964313138356262 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit: BPF prog-id=111 op=LOAD May 10 00:36:14.156000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f1d90 items=0 ppid=2093 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313566653266366636333333316166396638633964313138356262 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit: BPF prog-id=112 op=LOAD May 10 00:36:14.156000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f1dd8 items=0 ppid=2093 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313566653266366636333333316166396638633964313138356262 May 10 00:36:14.156000 audit: BPF prog-id=112 op=UNLOAD May 10 00:36:14.156000 audit: BPF prog-id=111 op=UNLOAD May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.156000 audit: BPF prog-id=113 op=LOAD May 10 00:36:14.156000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003661e8 items=0 ppid=2093 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313566653266366636333333316166396638633964313138356262 May 10 00:36:14.183483 env[1215]: time="2025-05-10T00:36:14.183395780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-zhcj9,Uid:4fab5bb2-6f8a-4afd-b7d0-ad38c5fc4752,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6a15fe2f6f63331af9f8c9d1185bb7d8d55d4d44cd3e43ffe1012ce1ed9657e8\"" May 10 00:36:14.186257 env[1215]: time="2025-05-10T00:36:14.185167378Z" level=info msg="CreateContainer within sandbox \"512370b1a2ba15cde2f7682f3aef4724c730ffdf45d6030cc34c11f3fa8d4480\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9a776fd6601adf0324a1498774284421f761ee37bb157db8769ebbd2f2c359a7\"" May 10 00:36:14.187791 env[1215]: time="2025-05-10T00:36:14.187746890Z" level=info msg="StartContainer for \"9a776fd6601adf0324a1498774284421f761ee37bb157db8769ebbd2f2c359a7\"" May 10 00:36:14.188115 env[1215]: time="2025-05-10T00:36:14.188084836Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:36:14.204090 systemd[1]: Started cri-containerd-9a776fd6601adf0324a1498774284421f761ee37bb157db8769ebbd2f2c359a7.scope. May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc01dd61de8 items=0 ppid=2058 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373736666436363031616466303332346131343938373734323834 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit: BPF prog-id=114 op=LOAD May 10 00:36:14.215000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003009c8 items=0 ppid=2058 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373736666436363031616466303332346131343938373734323834 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.215000 audit: BPF prog-id=115 op=LOAD May 10 00:36:14.215000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000300a18 items=0 ppid=2058 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373736666436363031616466303332346131343938373734323834 May 10 00:36:14.216000 audit: BPF prog-id=115 op=UNLOAD May 10 00:36:14.216000 audit: BPF prog-id=114 op=UNLOAD May 10 00:36:14.216000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:14.216000 audit: BPF prog-id=116 op=LOAD May 10 00:36:14.216000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000300aa8 items=0 ppid=2058 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373736666436363031616466303332346131343938373734323834 May 10 00:36:14.234762 env[1215]: time="2025-05-10T00:36:14.234664256Z" level=info msg="StartContainer for \"9a776fd6601adf0324a1498774284421f761ee37bb157db8769ebbd2f2c359a7\" returns successfully" May 10 00:36:14.330000 audit[2196]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.330000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8e747b90 a2=0 a3=7ffd8e747b7c items=0 ppid=2147 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:36:14.331000 audit[2197]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.331000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe63eecef0 a2=0 a3=7ffe63eecedc items=0 ppid=2147 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:36:14.333000 audit[2198]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.333000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2a36fbe0 a2=0 a3=7ffe2a36fbcc items=0 ppid=2147 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:36:14.336000 audit[2199]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.336000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7ed561e0 a2=0 a3=7fff7ed561cc items=0 ppid=2147 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:36:14.338000 audit[2201]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.338000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd55ddc320 a2=0 a3=7ffd55ddc30c items=0 ppid=2147 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:36:14.339000 audit[2203]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.339000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcde06bbb0 a2=0 a3=7ffcde06bb9c items=0 ppid=2147 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:36:14.433000 audit[2204]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.433000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdeccf4100 a2=0 a3=7ffdeccf40ec items=0 ppid=2147 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:36:14.436000 audit[2206]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.436000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeeaf71570 a2=0 a3=7ffeeaf7155c items=0 ppid=2147 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:36:14.439000 audit[2209]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.439000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8fea3820 a2=0 a3=7ffc8fea380c items=0 ppid=2147 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:36:14.440000 audit[2210]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.440000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5f5625a0 a2=0 a3=7ffe5f56258c items=0 ppid=2147 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:36:14.442000 audit[2212]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.442000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc802af430 a2=0 a3=7ffc802af41c items=0 ppid=2147 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:36:14.443000 audit[2213]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.443000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe13c7d390 a2=0 a3=7ffe13c7d37c items=0 ppid=2147 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:36:14.446000 audit[2215]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.446000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe102bc050 a2=0 a3=7ffe102bc03c items=0 ppid=2147 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:36:14.448000 audit[2218]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.448000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec27fdc40 a2=0 a3=7ffec27fdc2c items=0 ppid=2147 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:36:14.449000 audit[2219]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.449000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeabde00a0 a2=0 a3=7ffeabde008c items=0 ppid=2147 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:36:14.451000 audit[2221]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.451000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbb2dd250 a2=0 a3=7ffdbb2dd23c items=0 ppid=2147 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:36:14.452000 audit[2222]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.452000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdc7a70c0 a2=0 a3=7fffdc7a70ac items=0 ppid=2147 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:36:14.454000 audit[2224]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.454000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd1ed83e0 a2=0 a3=7fffd1ed83cc items=0 ppid=2147 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:36:14.457000 audit[2227]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.457000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb2120f20 a2=0 a3=7fffb2120f0c items=0 ppid=2147 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:36:14.461000 audit[2230]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.461000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca042e870 a2=0 a3=7ffca042e85c items=0 ppid=2147 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:36:14.462000 audit[2231]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.462000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3dbade40 a2=0 a3=7fff3dbade2c items=0 ppid=2147 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:36:14.464000 audit[2233]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.464000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcf5224600 a2=0 a3=7ffcf52245ec items=0 ppid=2147 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:14.467000 audit[2236]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.467000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdef0e4600 a2=0 a3=7ffdef0e45ec items=0 ppid=2147 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:14.468000 audit[2237]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.468000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb3932c80 a2=0 a3=7ffcb3932c6c items=0 ppid=2147 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:36:14.471000 audit[2239]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:36:14.471000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe6ac75440 a2=0 a3=7ffe6ac7542c items=0 ppid=2147 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:36:14.493000 audit[2245]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:14.493000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff2130d390 a2=0 a3=7fff2130d37c items=0 ppid=2147 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:14.503000 audit[2245]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:14.503000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff2130d390 a2=0 a3=7fff2130d37c items=0 ppid=2147 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:14.505000 audit[2250]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.505000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe05a7ab60 a2=0 a3=7ffe05a7ab4c items=0 ppid=2147 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:36:14.508000 audit[2252]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.508000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffedde5b680 a2=0 a3=7ffedde5b66c items=0 ppid=2147 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:36:14.511000 audit[2255]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.511000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6eae5020 a2=0 a3=7ffd6eae500c items=0 ppid=2147 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:36:14.512000 audit[2256]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.512000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6e006b30 a2=0 a3=7ffd6e006b1c items=0 ppid=2147 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:36:14.514000 audit[2258]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.514000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc714e41e0 a2=0 a3=7ffc714e41cc items=0 ppid=2147 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:36:14.515000 audit[2259]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.515000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4d8d4ce0 a2=0 a3=7ffc4d8d4ccc items=0 ppid=2147 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:36:14.517000 audit[2261]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.517000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefef3bdd0 a2=0 a3=7ffefef3bdbc items=0 ppid=2147 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:36:14.521000 audit[2264]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.521000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcbf91c940 a2=0 a3=7ffcbf91c92c items=0 ppid=2147 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:36:14.522000 audit[2265]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.522000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe04c1be70 a2=0 a3=7ffe04c1be5c items=0 ppid=2147 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:36:14.524000 audit[2267]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.524000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3800a960 a2=0 a3=7ffc3800a94c items=0 ppid=2147 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:36:14.525000 audit[2268]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.525000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeae4a5c80 a2=0 a3=7ffeae4a5c6c items=0 ppid=2147 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:36:14.527000 audit[2270]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.527000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8414d0e0 a2=0 a3=7ffd8414d0cc items=0 ppid=2147 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:36:14.531000 audit[2273]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.531000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffede3e8970 a2=0 a3=7ffede3e895c items=0 ppid=2147 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:36:14.534000 audit[2276]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.534000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6c337fc0 a2=0 a3=7fff6c337fac items=0 ppid=2147 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:36:14.535000 audit[2277]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.535000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe278e33f0 a2=0 a3=7ffe278e33dc items=0 ppid=2147 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:36:14.537000 audit[2279]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.537000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd75e38790 a2=0 a3=7ffd75e3877c items=0 ppid=2147 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:14.540000 audit[2282]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.540000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc627a2360 a2=0 a3=7ffc627a234c items=0 ppid=2147 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:36:14.541000 audit[2283]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.541000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe18beba10 a2=0 a3=7ffe18beb9fc items=0 ppid=2147 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:36:14.543000 audit[2285]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.543000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfba55850 a2=0 a3=7ffdfba5583c items=0 ppid=2147 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:36:14.544000 audit[2286]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.544000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc27b31380 a2=0 a3=7ffc27b3136c items=0 ppid=2147 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:36:14.546000 audit[2288]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.546000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe1a94a530 a2=0 a3=7ffe1a94a51c items=0 ppid=2147 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:14.549000 audit[2291]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:36:14.549000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc714d81b0 a2=0 a3=7ffc714d819c items=0 ppid=2147 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:36:14.552000 audit[2293]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:36:14.552000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcde765360 a2=0 a3=7ffcde76534c items=0 ppid=2147 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.552000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:14.553000 audit[2293]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:36:14.553000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcde765360 a2=0 a3=7ffcde76534c items=0 ppid=2147 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:14.553000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:15.069594 kubelet[1961]: E0510 00:36:15.069539 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:15.077045 kubelet[1961]: I0510 00:36:15.076991 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-q8z4j" podStartSLOduration=2.076971556 podStartE2EDuration="2.076971556s" podCreationTimestamp="2025-05-10 00:36:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:36:15.076620435 +0000 UTC m=+7.144367643" watchObservedRunningTime="2025-05-10 00:36:15.076971556 +0000 UTC m=+7.144718774" May 10 00:36:15.412201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1033692998.mount: Deactivated successfully. May 10 00:36:16.369857 env[1215]: time="2025-05-10T00:36:16.369779277Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:16.371975 env[1215]: time="2025-05-10T00:36:16.371908098Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:16.373238 env[1215]: time="2025-05-10T00:36:16.373204371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:16.374895 env[1215]: time="2025-05-10T00:36:16.374851273Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:16.375479 env[1215]: time="2025-05-10T00:36:16.375437341Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:36:16.377627 env[1215]: time="2025-05-10T00:36:16.377590317Z" level=info msg="CreateContainer within sandbox \"6a15fe2f6f63331af9f8c9d1185bb7d8d55d4d44cd3e43ffe1012ce1ed9657e8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:36:16.391037 env[1215]: time="2025-05-10T00:36:16.390976994Z" level=info msg="CreateContainer within sandbox \"6a15fe2f6f63331af9f8c9d1185bb7d8d55d4d44cd3e43ffe1012ce1ed9657e8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"52354ab2f99f4253207bc7df39d13377d6e4f57473ad8ca3065e447bc254348a\"" May 10 00:36:16.392905 env[1215]: time="2025-05-10T00:36:16.391529699Z" level=info msg="StartContainer for \"52354ab2f99f4253207bc7df39d13377d6e4f57473ad8ca3065e447bc254348a\"" May 10 00:36:16.410557 systemd[1]: Started cri-containerd-52354ab2f99f4253207bc7df39d13377d6e4f57473ad8ca3065e447bc254348a.scope. May 10 00:36:16.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit: BPF prog-id=117 op=LOAD May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2093 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333534616232663939663432353332303762633764663339643133 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2093 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333534616232663939663432353332303762633764663339643133 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit: BPF prog-id=118 op=LOAD May 10 00:36:16.423000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4c40 items=0 ppid=2093 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333534616232663939663432353332303762633764663339643133 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.423000 audit: BPF prog-id=119 op=LOAD May 10 00:36:16.423000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4c88 items=0 ppid=2093 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333534616232663939663432353332303762633764663339643133 May 10 00:36:16.423000 audit: BPF prog-id=119 op=UNLOAD May 10 00:36:16.423000 audit: BPF prog-id=118 op=UNLOAD May 10 00:36:16.424000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:16.424000 audit: BPF prog-id=120 op=LOAD May 10 00:36:16.424000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5098 items=0 ppid=2093 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:16.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333534616232663939663432353332303762633764663339643133 May 10 00:36:16.441153 env[1215]: time="2025-05-10T00:36:16.441107364Z" level=info msg="StartContainer for \"52354ab2f99f4253207bc7df39d13377d6e4f57473ad8ca3065e447bc254348a\" returns successfully" May 10 00:36:17.082267 kubelet[1961]: I0510 00:36:17.082194 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-zhcj9" podStartSLOduration=1.890895393 podStartE2EDuration="4.082175022s" podCreationTimestamp="2025-05-10 00:36:13 +0000 UTC" firstStartedPulling="2025-05-10 00:36:14.185139775 +0000 UTC m=+6.252886983" lastFinishedPulling="2025-05-10 00:36:16.376419404 +0000 UTC m=+8.444166612" observedRunningTime="2025-05-10 00:36:17.081818443 +0000 UTC m=+9.149565661" watchObservedRunningTime="2025-05-10 00:36:17.082175022 +0000 UTC m=+9.149922220" May 10 00:36:17.508096 kubelet[1961]: E0510 00:36:17.508042 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:17.871997 kubelet[1961]: E0510 00:36:17.871861 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:18.075930 kubelet[1961]: E0510 00:36:18.075864 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:18.076097 kubelet[1961]: E0510 00:36:18.075960 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:19.234000 audit[2338]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.236016 kernel: kauditd_printk_skb: 362 callbacks suppressed May 10 00:36:19.236169 kernel: audit: type=1325 audit(1746837379.234:925): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.234000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe80f2bbd0 a2=0 a3=7ffe80f2bbbc items=0 ppid=2147 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.243885 kernel: audit: type=1300 audit(1746837379.234:925): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe80f2bbd0 a2=0 a3=7ffe80f2bbbc items=0 ppid=2147 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.243956 kernel: audit: type=1327 audit(1746837379.234:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.238000 audit[2338]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.248282 kernel: audit: type=1325 audit(1746837379.238:926): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.248312 kernel: audit: type=1300 audit(1746837379.238:926): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe80f2bbd0 a2=0 a3=0 items=0 ppid=2147 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.238000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe80f2bbd0 a2=0 a3=0 items=0 ppid=2147 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.254970 kernel: audit: type=1327 audit(1746837379.238:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.266000 audit[2340]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.266000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf3a965b0 a2=0 a3=7ffdf3a9659c items=0 ppid=2147 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.273939 kernel: audit: type=1325 audit(1746837379.266:927): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.273983 kernel: audit: type=1300 audit(1746837379.266:927): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf3a965b0 a2=0 a3=7ffdf3a9659c items=0 ppid=2147 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.274006 kernel: audit: type=1327 audit(1746837379.266:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.279000 audit[2340]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.279000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf3a965b0 a2=0 a3=0 items=0 ppid=2147 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:19.283715 kernel: audit: type=1325 audit(1746837379.279:928): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:19.459930 systemd[1]: Created slice kubepods-besteffort-podc3450338_f062_4275_b7e7_977fee9bebaf.slice. May 10 00:36:19.471241 systemd[1]: Created slice kubepods-besteffort-pod1826da63_56e3_46df_93bf_489466899261.slice. May 10 00:36:19.498759 kubelet[1961]: I0510 00:36:19.498596 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-flexvol-driver-host\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.498759 kubelet[1961]: I0510 00:36:19.498666 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-xtables-lock\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499202 kubelet[1961]: I0510 00:36:19.498761 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c3450338-f062-4275-b7e7-977fee9bebaf-tigera-ca-bundle\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499202 kubelet[1961]: I0510 00:36:19.498800 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-cni-bin-dir\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499202 kubelet[1961]: I0510 00:36:19.498840 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/1826da63-56e3-46df-93bf-489466899261-typha-certs\") pod \"calico-typha-5447f9c9d8-js7h4\" (UID: \"1826da63-56e3-46df-93bf-489466899261\") " pod="calico-system/calico-typha-5447f9c9d8-js7h4" May 10 00:36:19.499202 kubelet[1961]: I0510 00:36:19.498853 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qkwvd\" (UniqueName: \"kubernetes.io/projected/c3450338-f062-4275-b7e7-977fee9bebaf-kube-api-access-qkwvd\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499202 kubelet[1961]: I0510 00:36:19.498872 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-cni-log-dir\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499470 kubelet[1961]: I0510 00:36:19.498889 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-lib-modules\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499470 kubelet[1961]: I0510 00:36:19.498913 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-cni-net-dir\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499470 kubelet[1961]: I0510 00:36:19.498928 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1826da63-56e3-46df-93bf-489466899261-tigera-ca-bundle\") pod \"calico-typha-5447f9c9d8-js7h4\" (UID: \"1826da63-56e3-46df-93bf-489466899261\") " pod="calico-system/calico-typha-5447f9c9d8-js7h4" May 10 00:36:19.499470 kubelet[1961]: I0510 00:36:19.498944 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c3450338-f062-4275-b7e7-977fee9bebaf-node-certs\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499470 kubelet[1961]: I0510 00:36:19.498959 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-var-run-calico\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499725 kubelet[1961]: I0510 00:36:19.498976 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-var-lib-calico\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.499725 kubelet[1961]: I0510 00:36:19.499017 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4p88k\" (UniqueName: \"kubernetes.io/projected/1826da63-56e3-46df-93bf-489466899261-kube-api-access-4p88k\") pod \"calico-typha-5447f9c9d8-js7h4\" (UID: \"1826da63-56e3-46df-93bf-489466899261\") " pod="calico-system/calico-typha-5447f9c9d8-js7h4" May 10 00:36:19.499725 kubelet[1961]: I0510 00:36:19.499056 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c3450338-f062-4275-b7e7-977fee9bebaf-policysync\") pod \"calico-node-dq4nc\" (UID: \"c3450338-f062-4275-b7e7-977fee9bebaf\") " pod="calico-system/calico-node-dq4nc" May 10 00:36:19.513791 kubelet[1961]: E0510 00:36:19.513703 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:19.600052 kubelet[1961]: I0510 00:36:19.599993 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/27d06b5b-7b04-4f47-8e55-36ac8c0c3647-socket-dir\") pod \"csi-node-driver-2b67p\" (UID: \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\") " pod="calico-system/csi-node-driver-2b67p" May 10 00:36:19.600052 kubelet[1961]: I0510 00:36:19.600047 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2x5rw\" (UniqueName: \"kubernetes.io/projected/27d06b5b-7b04-4f47-8e55-36ac8c0c3647-kube-api-access-2x5rw\") pod \"csi-node-driver-2b67p\" (UID: \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\") " pod="calico-system/csi-node-driver-2b67p" May 10 00:36:19.600259 kubelet[1961]: I0510 00:36:19.600086 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/27d06b5b-7b04-4f47-8e55-36ac8c0c3647-kubelet-dir\") pod \"csi-node-driver-2b67p\" (UID: \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\") " pod="calico-system/csi-node-driver-2b67p" May 10 00:36:19.600259 kubelet[1961]: I0510 00:36:19.600145 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/27d06b5b-7b04-4f47-8e55-36ac8c0c3647-varrun\") pod \"csi-node-driver-2b67p\" (UID: \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\") " pod="calico-system/csi-node-driver-2b67p" May 10 00:36:19.600259 kubelet[1961]: I0510 00:36:19.600189 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/27d06b5b-7b04-4f47-8e55-36ac8c0c3647-registration-dir\") pod \"csi-node-driver-2b67p\" (UID: \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\") " pod="calico-system/csi-node-driver-2b67p" May 10 00:36:19.602478 kubelet[1961]: E0510 00:36:19.602447 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.602478 kubelet[1961]: W0510 00:36:19.602477 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.602569 kubelet[1961]: E0510 00:36:19.602523 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.602795 kubelet[1961]: E0510 00:36:19.602780 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.602795 kubelet[1961]: W0510 00:36:19.602794 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.602871 kubelet[1961]: E0510 00:36:19.602818 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.603059 kubelet[1961]: E0510 00:36:19.603041 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.603059 kubelet[1961]: W0510 00:36:19.603057 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.603130 kubelet[1961]: E0510 00:36:19.603082 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.603450 kubelet[1961]: E0510 00:36:19.603430 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.603568 kubelet[1961]: W0510 00:36:19.603549 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.603732 kubelet[1961]: E0510 00:36:19.603667 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.605776 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.608738 kubelet[1961]: W0510 00:36:19.605801 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.605830 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.606584 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.608738 kubelet[1961]: W0510 00:36:19.606596 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.606618 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.607199 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.608738 kubelet[1961]: W0510 00:36:19.607210 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.607234 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.608738 kubelet[1961]: E0510 00:36:19.607471 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.609170 kubelet[1961]: W0510 00:36:19.607479 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.609170 kubelet[1961]: E0510 00:36:19.607488 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.620091 kubelet[1961]: E0510 00:36:19.619913 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.620091 kubelet[1961]: W0510 00:36:19.619946 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.620091 kubelet[1961]: E0510 00:36:19.619972 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.623044 kubelet[1961]: E0510 00:36:19.623017 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.623044 kubelet[1961]: W0510 00:36:19.623039 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.623193 kubelet[1961]: E0510 00:36:19.623054 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.701364 kubelet[1961]: E0510 00:36:19.701310 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.701364 kubelet[1961]: W0510 00:36:19.701339 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.701364 kubelet[1961]: E0510 00:36:19.701361 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.701637 kubelet[1961]: E0510 00:36:19.701585 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.701637 kubelet[1961]: W0510 00:36:19.701598 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.701637 kubelet[1961]: E0510 00:36:19.701614 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.701840 kubelet[1961]: E0510 00:36:19.701817 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.701840 kubelet[1961]: W0510 00:36:19.701832 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.701935 kubelet[1961]: E0510 00:36:19.701845 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.702062 kubelet[1961]: E0510 00:36:19.702048 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.702062 kubelet[1961]: W0510 00:36:19.702060 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.702128 kubelet[1961]: E0510 00:36:19.702074 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.702272 kubelet[1961]: E0510 00:36:19.702253 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.702272 kubelet[1961]: W0510 00:36:19.702264 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.702338 kubelet[1961]: E0510 00:36:19.702280 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.702494 kubelet[1961]: E0510 00:36:19.702476 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.702494 kubelet[1961]: W0510 00:36:19.702489 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.702584 kubelet[1961]: E0510 00:36:19.702504 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.702677 kubelet[1961]: E0510 00:36:19.702663 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.702677 kubelet[1961]: W0510 00:36:19.702675 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.702766 kubelet[1961]: E0510 00:36:19.702709 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.702845 kubelet[1961]: E0510 00:36:19.702833 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.702845 kubelet[1961]: W0510 00:36:19.702844 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.702919 kubelet[1961]: E0510 00:36:19.702889 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.703048 kubelet[1961]: E0510 00:36:19.703032 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.703048 kubelet[1961]: W0510 00:36:19.703044 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.703142 kubelet[1961]: E0510 00:36:19.703071 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.703215 kubelet[1961]: E0510 00:36:19.703202 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.703215 kubelet[1961]: W0510 00:36:19.703213 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.703287 kubelet[1961]: E0510 00:36:19.703236 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.703380 kubelet[1961]: E0510 00:36:19.703368 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.703380 kubelet[1961]: W0510 00:36:19.703379 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.703449 kubelet[1961]: E0510 00:36:19.703404 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.703560 kubelet[1961]: E0510 00:36:19.703540 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.703560 kubelet[1961]: W0510 00:36:19.703556 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.703666 kubelet[1961]: E0510 00:36:19.703570 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.703846 kubelet[1961]: E0510 00:36:19.703828 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.703846 kubelet[1961]: W0510 00:36:19.703843 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.703977 kubelet[1961]: E0510 00:36:19.703859 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.704106 kubelet[1961]: E0510 00:36:19.704079 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.704106 kubelet[1961]: W0510 00:36:19.704103 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.704219 kubelet[1961]: E0510 00:36:19.704126 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.704335 kubelet[1961]: E0510 00:36:19.704317 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.704335 kubelet[1961]: W0510 00:36:19.704330 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.704445 kubelet[1961]: E0510 00:36:19.704366 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.704530 kubelet[1961]: E0510 00:36:19.704514 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.704584 kubelet[1961]: W0510 00:36:19.704526 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.704584 kubelet[1961]: E0510 00:36:19.704566 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.704754 kubelet[1961]: E0510 00:36:19.704738 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.704754 kubelet[1961]: W0510 00:36:19.704751 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.704872 kubelet[1961]: E0510 00:36:19.704775 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.704946 kubelet[1961]: E0510 00:36:19.704933 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.704946 kubelet[1961]: W0510 00:36:19.704944 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.705019 kubelet[1961]: E0510 00:36:19.704981 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.705139 kubelet[1961]: E0510 00:36:19.705127 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.705139 kubelet[1961]: W0510 00:36:19.705138 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.705374 kubelet[1961]: E0510 00:36:19.705151 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.705374 kubelet[1961]: E0510 00:36:19.705341 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.705374 kubelet[1961]: W0510 00:36:19.705351 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.705374 kubelet[1961]: E0510 00:36:19.705364 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.705568 kubelet[1961]: E0510 00:36:19.705552 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.705568 kubelet[1961]: W0510 00:36:19.705564 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.705658 kubelet[1961]: E0510 00:36:19.705576 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.705813 kubelet[1961]: E0510 00:36:19.705795 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.705813 kubelet[1961]: W0510 00:36:19.705808 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.705916 kubelet[1961]: E0510 00:36:19.705823 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.706059 kubelet[1961]: E0510 00:36:19.706039 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.706059 kubelet[1961]: W0510 00:36:19.706055 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.706155 kubelet[1961]: E0510 00:36:19.706071 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.706315 kubelet[1961]: E0510 00:36:19.706296 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.706315 kubelet[1961]: W0510 00:36:19.706313 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.706435 kubelet[1961]: E0510 00:36:19.706329 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.706572 kubelet[1961]: E0510 00:36:19.706556 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.706572 kubelet[1961]: W0510 00:36:19.706570 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.706661 kubelet[1961]: E0510 00:36:19.706581 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.716335 kubelet[1961]: E0510 00:36:19.716304 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:19.716335 kubelet[1961]: W0510 00:36:19.716326 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:19.716490 kubelet[1961]: E0510 00:36:19.716346 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:19.769092 kubelet[1961]: E0510 00:36:19.768966 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:19.769970 env[1215]: time="2025-05-10T00:36:19.769526894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dq4nc,Uid:c3450338-f062-4275-b7e7-977fee9bebaf,Namespace:calico-system,Attempt:0,}" May 10 00:36:19.773625 kubelet[1961]: E0510 00:36:19.773592 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:19.774195 env[1215]: time="2025-05-10T00:36:19.774158093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5447f9c9d8-js7h4,Uid:1826da63-56e3-46df-93bf-489466899261,Namespace:calico-system,Attempt:0,}" May 10 00:36:19.848015 env[1215]: time="2025-05-10T00:36:19.847929277Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:19.848242 env[1215]: time="2025-05-10T00:36:19.847980223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:19.848242 env[1215]: time="2025-05-10T00:36:19.848072940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:19.848356 env[1215]: time="2025-05-10T00:36:19.848283801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f pid=2388 runtime=io.containerd.runc.v2 May 10 00:36:19.849448 env[1215]: time="2025-05-10T00:36:19.849340842Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:19.849519 env[1215]: time="2025-05-10T00:36:19.849466812Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:19.849519 env[1215]: time="2025-05-10T00:36:19.849491178Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:19.849751 env[1215]: time="2025-05-10T00:36:19.849669126Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bec3799d6c648061d7fc0bd192146f0c9c2b0f3b83ea9615d7e337eb9cb81c2 pid=2402 runtime=io.containerd.runc.v2 May 10 00:36:19.863327 systemd[1]: Started cri-containerd-2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f.scope. May 10 00:36:19.870216 systemd[1]: Started cri-containerd-2bec3799d6c648061d7fc0bd192146f0c9c2b0f3b83ea9615d7e337eb9cb81c2.scope. May 10 00:36:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.881000 audit: BPF prog-id=121 op=LOAD May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2388 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323837636333346561666435613038363063373337386566663737 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2388 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323837636333346561666435613038363063373337386566663737 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit: BPF prog-id=122 op=LOAD May 10 00:36:19.882000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d4aa0 items=0 ppid=2388 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323837636333346561666435613038363063373337386566663737 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit: BPF prog-id=123 op=LOAD May 10 00:36:19.882000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d4ae8 items=0 ppid=2388 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323837636333346561666435613038363063373337386566663737 May 10 00:36:19.882000 audit: BPF prog-id=123 op=UNLOAD May 10 00:36:19.882000 audit: BPF prog-id=122 op=UNLOAD May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.882000 audit: BPF prog-id=124 op=LOAD May 10 00:36:19.882000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d4ef8 items=0 ppid=2388 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323837636333346561666435613038363063373337386566663737 May 10 00:36:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit: BPF prog-id=125 op=LOAD May 10 00:36:19.885000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.885000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2402 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656333373939643663363438303631643766633062643139323134 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2402 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656333373939643663363438303631643766633062643139323134 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.886000 audit: BPF prog-id=126 op=LOAD May 10 00:36:19.886000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c8610 items=0 ppid=2402 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656333373939643663363438303631643766633062643139323134 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.887000 audit: BPF prog-id=127 op=LOAD May 10 00:36:19.887000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c8658 items=0 ppid=2402 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656333373939643663363438303631643766633062643139323134 May 10 00:36:19.888000 audit: BPF prog-id=127 op=UNLOAD May 10 00:36:19.888000 audit: BPF prog-id=126 op=UNLOAD May 10 00:36:19.888000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:19.888000 audit: BPF prog-id=128 op=LOAD May 10 00:36:19.888000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c8a68 items=0 ppid=2402 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:19.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656333373939643663363438303631643766633062643139323134 May 10 00:36:19.893459 env[1215]: time="2025-05-10T00:36:19.893409561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dq4nc,Uid:c3450338-f062-4275-b7e7-977fee9bebaf,Namespace:calico-system,Attempt:0,} returns sandbox id \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\"" May 10 00:36:19.894041 kubelet[1961]: E0510 00:36:19.894021 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:19.894976 env[1215]: time="2025-05-10T00:36:19.894955201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:36:19.912969 env[1215]: time="2025-05-10T00:36:19.912887448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5447f9c9d8-js7h4,Uid:1826da63-56e3-46df-93bf-489466899261,Namespace:calico-system,Attempt:0,} returns sandbox id \"2bec3799d6c648061d7fc0bd192146f0c9c2b0f3b83ea9615d7e337eb9cb81c2\"" May 10 00:36:19.913734 kubelet[1961]: E0510 00:36:19.913708 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:20.292000 audit[2465]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:20.292000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffd333d640 a2=0 a3=7fffd333d62c items=0 ppid=2147 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:20.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:20.300000 audit[2465]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:20.300000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffd333d640 a2=0 a3=0 items=0 ppid=2147 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:20.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:20.760619 kubelet[1961]: E0510 00:36:20.760586 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:20.800315 kubelet[1961]: E0510 00:36:20.800285 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.800315 kubelet[1961]: W0510 00:36:20.800303 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.800315 kubelet[1961]: E0510 00:36:20.800320 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.800526 kubelet[1961]: E0510 00:36:20.800479 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.800526 kubelet[1961]: W0510 00:36:20.800488 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.800526 kubelet[1961]: E0510 00:36:20.800510 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.800797 kubelet[1961]: E0510 00:36:20.800645 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.800797 kubelet[1961]: W0510 00:36:20.800668 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.800797 kubelet[1961]: E0510 00:36:20.800679 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.800962 kubelet[1961]: E0510 00:36:20.800940 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.800962 kubelet[1961]: W0510 00:36:20.800957 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.801020 kubelet[1961]: E0510 00:36:20.800969 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.801142 kubelet[1961]: E0510 00:36:20.801128 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.801142 kubelet[1961]: W0510 00:36:20.801141 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.801205 kubelet[1961]: E0510 00:36:20.801151 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.801294 kubelet[1961]: E0510 00:36:20.801280 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.801294 kubelet[1961]: W0510 00:36:20.801291 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.801367 kubelet[1961]: E0510 00:36:20.801299 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.801430 kubelet[1961]: E0510 00:36:20.801418 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.801430 kubelet[1961]: W0510 00:36:20.801428 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.801481 kubelet[1961]: E0510 00:36:20.801436 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.801575 kubelet[1961]: E0510 00:36:20.801564 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.801601 kubelet[1961]: W0510 00:36:20.801575 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.801601 kubelet[1961]: E0510 00:36:20.801583 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.801777 kubelet[1961]: E0510 00:36:20.801763 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.801777 kubelet[1961]: W0510 00:36:20.801775 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.801843 kubelet[1961]: E0510 00:36:20.801784 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.801980 kubelet[1961]: E0510 00:36:20.801961 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.801980 kubelet[1961]: W0510 00:36:20.801973 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.802033 kubelet[1961]: E0510 00:36:20.801982 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.802139 kubelet[1961]: E0510 00:36:20.802129 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.802162 kubelet[1961]: W0510 00:36:20.802140 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.802162 kubelet[1961]: E0510 00:36:20.802150 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.802322 kubelet[1961]: E0510 00:36:20.802311 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.802351 kubelet[1961]: W0510 00:36:20.802323 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.802351 kubelet[1961]: E0510 00:36:20.802332 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.802475 kubelet[1961]: E0510 00:36:20.802465 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.802503 kubelet[1961]: W0510 00:36:20.802475 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.802503 kubelet[1961]: E0510 00:36:20.802483 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.802616 kubelet[1961]: E0510 00:36:20.802606 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.802643 kubelet[1961]: W0510 00:36:20.802617 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.802643 kubelet[1961]: E0510 00:36:20.802626 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:20.802772 kubelet[1961]: E0510 00:36:20.802762 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:20.802802 kubelet[1961]: W0510 00:36:20.802773 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:20.802802 kubelet[1961]: E0510 00:36:20.802782 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.046392 kubelet[1961]: E0510 00:36:21.046242 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:21.083599 kubelet[1961]: E0510 00:36:21.083559 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:21.105640 kubelet[1961]: E0510 00:36:21.105602 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.105640 kubelet[1961]: W0510 00:36:21.105627 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.105640 kubelet[1961]: E0510 00:36:21.105648 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.105933 kubelet[1961]: E0510 00:36:21.105838 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.105933 kubelet[1961]: W0510 00:36:21.105854 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.105933 kubelet[1961]: E0510 00:36:21.105865 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.106119 kubelet[1961]: E0510 00:36:21.106102 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.106119 kubelet[1961]: W0510 00:36:21.106116 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.106182 kubelet[1961]: E0510 00:36:21.106125 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.106293 kubelet[1961]: E0510 00:36:21.106279 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.106332 kubelet[1961]: W0510 00:36:21.106291 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.106332 kubelet[1961]: E0510 00:36:21.106310 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.106476 kubelet[1961]: E0510 00:36:21.106460 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.106476 kubelet[1961]: W0510 00:36:21.106471 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.106548 kubelet[1961]: E0510 00:36:21.106480 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.106648 kubelet[1961]: E0510 00:36:21.106634 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.106648 kubelet[1961]: W0510 00:36:21.106646 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.106745 kubelet[1961]: E0510 00:36:21.106655 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.106834 kubelet[1961]: E0510 00:36:21.106820 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.106834 kubelet[1961]: W0510 00:36:21.106832 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.106919 kubelet[1961]: E0510 00:36:21.106841 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.107031 kubelet[1961]: E0510 00:36:21.107016 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.107031 kubelet[1961]: W0510 00:36:21.107028 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.107106 kubelet[1961]: E0510 00:36:21.107037 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.107190 kubelet[1961]: E0510 00:36:21.107176 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.107190 kubelet[1961]: W0510 00:36:21.107187 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.107256 kubelet[1961]: E0510 00:36:21.107195 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.107338 kubelet[1961]: E0510 00:36:21.107325 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.107338 kubelet[1961]: W0510 00:36:21.107336 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.107413 kubelet[1961]: E0510 00:36:21.107344 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.107498 kubelet[1961]: E0510 00:36:21.107483 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.107498 kubelet[1961]: W0510 00:36:21.107495 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.107570 kubelet[1961]: E0510 00:36:21.107503 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.107659 kubelet[1961]: E0510 00:36:21.107642 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.107659 kubelet[1961]: W0510 00:36:21.107653 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.107659 kubelet[1961]: E0510 00:36:21.107660 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.107855 kubelet[1961]: E0510 00:36:21.107841 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.107855 kubelet[1961]: W0510 00:36:21.107853 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.107928 kubelet[1961]: E0510 00:36:21.107861 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.108035 kubelet[1961]: E0510 00:36:21.108018 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.108035 kubelet[1961]: W0510 00:36:21.108030 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.108035 kubelet[1961]: E0510 00:36:21.108037 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.108189 kubelet[1961]: E0510 00:36:21.108174 1961 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:36:21.108189 kubelet[1961]: W0510 00:36:21.108185 1961 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:36:21.108251 kubelet[1961]: E0510 00:36:21.108194 1961 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:36:21.787158 env[1215]: time="2025-05-10T00:36:21.787073833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:21.789075 env[1215]: time="2025-05-10T00:36:21.789037372Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:21.790759 env[1215]: time="2025-05-10T00:36:21.790725207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:21.792595 env[1215]: time="2025-05-10T00:36:21.792559018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:21.793178 env[1215]: time="2025-05-10T00:36:21.793148648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:36:21.794356 env[1215]: time="2025-05-10T00:36:21.794312448Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:36:21.800407 env[1215]: time="2025-05-10T00:36:21.800349281Z" level=info msg="CreateContainer within sandbox \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:36:21.826916 env[1215]: time="2025-05-10T00:36:21.826861093Z" level=info msg="CreateContainer within sandbox \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214\"" May 10 00:36:21.827552 env[1215]: time="2025-05-10T00:36:21.827512590Z" level=info msg="StartContainer for \"8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214\"" May 10 00:36:21.845569 systemd[1]: run-containerd-runc-k8s.io-8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214-runc.nHLb6Q.mount: Deactivated successfully. May 10 00:36:21.847013 systemd[1]: Started cri-containerd-8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214.scope. May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3c98712518 items=0 ppid=2388 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:21.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736626663633131373664636361613864336533313766343461 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit: BPF prog-id=129 op=LOAD May 10 00:36:21.858000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dfba8 items=0 ppid=2388 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:21.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736626663633131373664636361613864336533313766343461 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit: BPF prog-id=130 op=LOAD May 10 00:36:21.858000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dfbf8 items=0 ppid=2388 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:21.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736626663633131373664636361613864336533313766343461 May 10 00:36:21.858000 audit: BPF prog-id=130 op=UNLOAD May 10 00:36:21.858000 audit: BPF prog-id=129 op=UNLOAD May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:21.858000 audit: BPF prog-id=131 op=LOAD May 10 00:36:21.858000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dfc88 items=0 ppid=2388 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:21.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736626663633131373664636361613864336533313766343461 May 10 00:36:21.879990 env[1215]: time="2025-05-10T00:36:21.879651903Z" level=info msg="StartContainer for \"8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214\" returns successfully" May 10 00:36:21.884067 systemd[1]: cri-containerd-8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214.scope: Deactivated successfully. May 10 00:36:21.890000 audit: BPF prog-id=131 op=UNLOAD May 10 00:36:22.029156 env[1215]: time="2025-05-10T00:36:22.029084269Z" level=info msg="shim disconnected" id=8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214 May 10 00:36:22.029156 env[1215]: time="2025-05-10T00:36:22.029134274Z" level=warning msg="cleaning up after shim disconnected" id=8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214 namespace=k8s.io May 10 00:36:22.029156 env[1215]: time="2025-05-10T00:36:22.029145184Z" level=info msg="cleaning up dead shim" May 10 00:36:22.036265 env[1215]: time="2025-05-10T00:36:22.036200851Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:36:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2541 runtime=io.containerd.runc.v2\n" May 10 00:36:22.087535 kubelet[1961]: E0510 00:36:22.086379 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:22.822272 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e376bfcc1176dccaa8d3e317f44a294ca05eeb25fb2c237b5494c7080656214-rootfs.mount: Deactivated successfully. May 10 00:36:23.046060 kubelet[1961]: E0510 00:36:23.045999 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:23.548809 update_engine[1207]: I0510 00:36:23.548748 1207 update_attempter.cc:509] Updating boot flags... May 10 00:36:24.387258 env[1215]: time="2025-05-10T00:36:24.387191651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:24.389103 env[1215]: time="2025-05-10T00:36:24.389073587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:24.390936 env[1215]: time="2025-05-10T00:36:24.390884798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:24.392303 env[1215]: time="2025-05-10T00:36:24.392249193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:24.392752 env[1215]: time="2025-05-10T00:36:24.392724263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:36:24.393706 env[1215]: time="2025-05-10T00:36:24.393658794Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:36:24.400401 env[1215]: time="2025-05-10T00:36:24.400354842Z" level=info msg="CreateContainer within sandbox \"2bec3799d6c648061d7fc0bd192146f0c9c2b0f3b83ea9615d7e337eb9cb81c2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:36:24.416166 env[1215]: time="2025-05-10T00:36:24.416115293Z" level=info msg="CreateContainer within sandbox \"2bec3799d6c648061d7fc0bd192146f0c9c2b0f3b83ea9615d7e337eb9cb81c2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"08d0b593c9b1fd1e9543fb71b1d3356e5d252a7cd61b0d1afe2710cf21766b7a\"" May 10 00:36:24.416663 env[1215]: time="2025-05-10T00:36:24.416639817Z" level=info msg="StartContainer for \"08d0b593c9b1fd1e9543fb71b1d3356e5d252a7cd61b0d1afe2710cf21766b7a\"" May 10 00:36:24.433188 systemd[1]: Started cri-containerd-08d0b593c9b1fd1e9543fb71b1d3356e5d252a7cd61b0d1afe2710cf21766b7a.scope. May 10 00:36:24.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.449010 kernel: kauditd_printk_skb: 166 callbacks suppressed May 10 00:36:24.449071 kernel: audit: type=1400 audit(1746837384.447:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460824 kernel: audit: type=1400 audit(1746837384.447:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460955 kernel: audit: type=1400 audit(1746837384.447:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460995 kernel: audit: type=1400 audit(1746837384.447:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.464202 kernel: audit: type=1400 audit(1746837384.447:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.464269 kernel: audit: type=1400 audit(1746837384.447:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.470201 kernel: audit: type=1400 audit(1746837384.447:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.470245 kernel: audit: type=1400 audit(1746837384.447:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.473320 kernel: audit: type=1400 audit(1746837384.447:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.479573 kernel: audit: type=1400 audit(1746837384.451:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.451000 audit: BPF prog-id=132 op=LOAD May 10 00:36:24.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2402 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:24.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643062353933633962316664316539353433666237316231643333 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2402 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:24.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643062353933633962316664316539353433666237316231643333 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.452000 audit: BPF prog-id=133 op=LOAD May 10 00:36:24.452000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028aaa0 items=0 ppid=2402 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:24.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643062353933633962316664316539353433666237316231643333 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.454000 audit: BPF prog-id=134 op=LOAD May 10 00:36:24.454000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028aae8 items=0 ppid=2402 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:24.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643062353933633962316664316539353433666237316231643333 May 10 00:36:24.460000 audit: BPF prog-id=134 op=UNLOAD May 10 00:36:24.460000 audit: BPF prog-id=133 op=UNLOAD May 10 00:36:24.460000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:24.460000 audit: BPF prog-id=135 op=LOAD May 10 00:36:24.460000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028aef8 items=0 ppid=2402 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:24.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643062353933633962316664316539353433666237316231643333 May 10 00:36:24.506665 env[1215]: time="2025-05-10T00:36:24.506607324Z" level=info msg="StartContainer for \"08d0b593c9b1fd1e9543fb71b1d3356e5d252a7cd61b0d1afe2710cf21766b7a\" returns successfully" May 10 00:36:25.045750 kubelet[1961]: E0510 00:36:25.045663 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:25.091848 kubelet[1961]: E0510 00:36:25.091809 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:25.104141 kubelet[1961]: I0510 00:36:25.104067 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5447f9c9d8-js7h4" podStartSLOduration=1.6251470860000001 podStartE2EDuration="6.104048107s" podCreationTimestamp="2025-05-10 00:36:19 +0000 UTC" firstStartedPulling="2025-05-10 00:36:19.914542185 +0000 UTC m=+11.982289393" lastFinishedPulling="2025-05-10 00:36:24.393443206 +0000 UTC m=+16.461190414" observedRunningTime="2025-05-10 00:36:25.103835344 +0000 UTC m=+17.171582552" watchObservedRunningTime="2025-05-10 00:36:25.104048107 +0000 UTC m=+17.171795315" May 10 00:36:26.093868 kubelet[1961]: I0510 00:36:26.093827 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:26.094228 kubelet[1961]: E0510 00:36:26.094147 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:27.046449 kubelet[1961]: E0510 00:36:27.046373 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:29.046462 kubelet[1961]: E0510 00:36:29.046380 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:30.076078 env[1215]: time="2025-05-10T00:36:30.075993880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:30.078014 env[1215]: time="2025-05-10T00:36:30.077953420Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:30.079640 env[1215]: time="2025-05-10T00:36:30.079584941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:30.081030 env[1215]: time="2025-05-10T00:36:30.080973213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:30.081666 env[1215]: time="2025-05-10T00:36:30.081612391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:36:30.084230 env[1215]: time="2025-05-10T00:36:30.084194518Z" level=info msg="CreateContainer within sandbox \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:36:30.098659 env[1215]: time="2025-05-10T00:36:30.098599253Z" level=info msg="CreateContainer within sandbox \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a\"" May 10 00:36:30.099204 env[1215]: time="2025-05-10T00:36:30.099159401Z" level=info msg="StartContainer for \"a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a\"" May 10 00:36:30.129356 systemd[1]: run-containerd-runc-k8s.io-a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a-runc.QGs1ov.mount: Deactivated successfully. May 10 00:36:30.131241 systemd[1]: Started cri-containerd-a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a.scope. May 10 00:36:30.144000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.146181 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:36:30.146280 kernel: audit: type=1400 audit(1746837390.144:992): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff4a442bb58 items=0 ppid=2388 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:30.154411 kernel: audit: type=1300 audit(1746837390.144:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff4a442bb58 items=0 ppid=2388 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:30.154492 kernel: audit: type=1327 audit(1746837390.144:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333038366261623839373137623730646130323464643734663538 May 10 00:36:30.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333038366261623839373137623730646130323464643734663538 May 10 00:36:30.158833 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.165134 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.165182 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.171281 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.174401 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.177824 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.177872 kernel: audit: type=1400 audit(1746837390.144:993): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.144000 audit: BPF prog-id=136 op=LOAD May 10 00:36:30.144000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cbba8 items=0 ppid=2388 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:30.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333038366261623839373137623730646130323464643734663538 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.148000 audit: BPF prog-id=137 op=LOAD May 10 00:36:30.148000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cbbf8 items=0 ppid=2388 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:30.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333038366261623839373137623730646130323464643734663538 May 10 00:36:30.158000 audit: BPF prog-id=137 op=UNLOAD May 10 00:36:30.158000 audit: BPF prog-id=136 op=UNLOAD May 10 00:36:30.158000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:30.158000 audit: BPF prog-id=138 op=LOAD May 10 00:36:30.158000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cbc88 items=0 ppid=2388 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:30.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131333038366261623839373137623730646130323464643734663538 May 10 00:36:30.389015 env[1215]: time="2025-05-10T00:36:30.388882665Z" level=info msg="StartContainer for \"a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a\" returns successfully" May 10 00:36:31.045834 kubelet[1961]: E0510 00:36:31.045760 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:31.087947 systemd[1]: cri-containerd-a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a.scope: Deactivated successfully. May 10 00:36:31.092000 audit: BPF prog-id=138 op=UNLOAD May 10 00:36:31.113412 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a-rootfs.mount: Deactivated successfully. May 10 00:36:31.116018 kubelet[1961]: I0510 00:36:31.115769 1961 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 10 00:36:31.119073 kubelet[1961]: E0510 00:36:31.119032 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:31.154277 systemd[1]: Created slice kubepods-besteffort-poda7dabf68_04f9_478a_a255_1446cd585546.slice. May 10 00:36:31.160848 systemd[1]: Created slice kubepods-burstable-pod39a293e5_816d_4109_845c_1f22b79176b1.slice. May 10 00:36:31.166400 systemd[1]: Created slice kubepods-burstable-pod932f65bf_ccfd_435f_86b4_1e2b5b34d9fe.slice. May 10 00:36:31.170719 systemd[1]: Created slice kubepods-besteffort-pod112fda21_21dd_48b3_8c0d_f5a5ae17309e.slice. May 10 00:36:31.175464 systemd[1]: Created slice kubepods-besteffort-pode3eee2db_8034_4bf4_8367_fbe10e8f2c14.slice. May 10 00:36:31.182176 kubelet[1961]: I0510 00:36:31.182118 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7zn7g\" (UniqueName: \"kubernetes.io/projected/e3eee2db-8034-4bf4-8367-fbe10e8f2c14-kube-api-access-7zn7g\") pod \"calico-apiserver-7c78d4657-wdbhf\" (UID: \"e3eee2db-8034-4bf4-8367-fbe10e8f2c14\") " pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" May 10 00:36:31.182176 kubelet[1961]: I0510 00:36:31.182176 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktp4r\" (UniqueName: \"kubernetes.io/projected/932f65bf-ccfd-435f-86b4-1e2b5b34d9fe-kube-api-access-ktp4r\") pod \"coredns-668d6bf9bc-9gkns\" (UID: \"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe\") " pod="kube-system/coredns-668d6bf9bc-9gkns" May 10 00:36:31.182409 kubelet[1961]: I0510 00:36:31.182195 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4nnk\" (UniqueName: \"kubernetes.io/projected/39a293e5-816d-4109-845c-1f22b79176b1-kube-api-access-t4nnk\") pod \"coredns-668d6bf9bc-hc94l\" (UID: \"39a293e5-816d-4109-845c-1f22b79176b1\") " pod="kube-system/coredns-668d6bf9bc-hc94l" May 10 00:36:31.182409 kubelet[1961]: I0510 00:36:31.182232 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e3eee2db-8034-4bf4-8367-fbe10e8f2c14-calico-apiserver-certs\") pod \"calico-apiserver-7c78d4657-wdbhf\" (UID: \"e3eee2db-8034-4bf4-8367-fbe10e8f2c14\") " pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" May 10 00:36:31.182409 kubelet[1961]: I0510 00:36:31.182247 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a7dabf68-04f9-478a-a255-1446cd585546-tigera-ca-bundle\") pod \"calico-kube-controllers-58bc994dcc-2mzxg\" (UID: \"a7dabf68-04f9-478a-a255-1446cd585546\") " pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" May 10 00:36:31.182409 kubelet[1961]: I0510 00:36:31.182263 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/39a293e5-816d-4109-845c-1f22b79176b1-config-volume\") pod \"coredns-668d6bf9bc-hc94l\" (UID: \"39a293e5-816d-4109-845c-1f22b79176b1\") " pod="kube-system/coredns-668d6bf9bc-hc94l" May 10 00:36:31.182409 kubelet[1961]: I0510 00:36:31.182278 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/112fda21-21dd-48b3-8c0d-f5a5ae17309e-calico-apiserver-certs\") pod \"calico-apiserver-7c78d4657-8jkqt\" (UID: \"112fda21-21dd-48b3-8c0d-f5a5ae17309e\") " pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" May 10 00:36:31.182590 kubelet[1961]: I0510 00:36:31.182292 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-424j7\" (UniqueName: \"kubernetes.io/projected/112fda21-21dd-48b3-8c0d-f5a5ae17309e-kube-api-access-424j7\") pod \"calico-apiserver-7c78d4657-8jkqt\" (UID: \"112fda21-21dd-48b3-8c0d-f5a5ae17309e\") " pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" May 10 00:36:31.182590 kubelet[1961]: I0510 00:36:31.182307 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/932f65bf-ccfd-435f-86b4-1e2b5b34d9fe-config-volume\") pod \"coredns-668d6bf9bc-9gkns\" (UID: \"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe\") " pod="kube-system/coredns-668d6bf9bc-9gkns" May 10 00:36:31.182590 kubelet[1961]: I0510 00:36:31.182325 1961 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbbpl\" (UniqueName: \"kubernetes.io/projected/a7dabf68-04f9-478a-a255-1446cd585546-kube-api-access-sbbpl\") pod \"calico-kube-controllers-58bc994dcc-2mzxg\" (UID: \"a7dabf68-04f9-478a-a255-1446cd585546\") " pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" May 10 00:36:31.389765 env[1215]: time="2025-05-10T00:36:31.388362002Z" level=info msg="shim disconnected" id=a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a May 10 00:36:31.389765 env[1215]: time="2025-05-10T00:36:31.388417978Z" level=warning msg="cleaning up after shim disconnected" id=a13086bab89717b70da024dd74f58789abcc8ad33aaa59f6ed1199c0dce80e2a namespace=k8s.io May 10 00:36:31.389765 env[1215]: time="2025-05-10T00:36:31.388429449Z" level=info msg="cleaning up dead shim" May 10 00:36:31.410947 env[1215]: time="2025-05-10T00:36:31.410339792Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:36:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2666 runtime=io.containerd.runc.v2\n" May 10 00:36:31.458536 env[1215]: time="2025-05-10T00:36:31.458460556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58bc994dcc-2mzxg,Uid:a7dabf68-04f9-478a-a255-1446cd585546,Namespace:calico-system,Attempt:0,}" May 10 00:36:31.464736 kubelet[1961]: E0510 00:36:31.464680 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:31.465172 env[1215]: time="2025-05-10T00:36:31.465126731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hc94l,Uid:39a293e5-816d-4109-845c-1f22b79176b1,Namespace:kube-system,Attempt:0,}" May 10 00:36:31.468433 kubelet[1961]: E0510 00:36:31.468405 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:31.469069 env[1215]: time="2025-05-10T00:36:31.469014441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9gkns,Uid:932f65bf-ccfd-435f-86b4-1e2b5b34d9fe,Namespace:kube-system,Attempt:0,}" May 10 00:36:31.474479 env[1215]: time="2025-05-10T00:36:31.474438230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-8jkqt,Uid:112fda21-21dd-48b3-8c0d-f5a5ae17309e,Namespace:calico-apiserver,Attempt:0,}" May 10 00:36:31.479218 env[1215]: time="2025-05-10T00:36:31.479183758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-wdbhf,Uid:e3eee2db-8034-4bf4-8367-fbe10e8f2c14,Namespace:calico-apiserver,Attempt:0,}" May 10 00:36:31.595669 env[1215]: time="2025-05-10T00:36:31.595568985Z" level=error msg="Failed to destroy network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.596114 env[1215]: time="2025-05-10T00:36:31.596076954Z" level=error msg="encountered an error cleaning up failed sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.596173 env[1215]: time="2025-05-10T00:36:31.596140033Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58bc994dcc-2mzxg,Uid:a7dabf68-04f9-478a-a255-1446cd585546,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.596444 kubelet[1961]: E0510 00:36:31.596389 1961 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.596531 kubelet[1961]: E0510 00:36:31.596483 1961 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" May 10 00:36:31.596531 kubelet[1961]: E0510 00:36:31.596504 1961 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" May 10 00:36:31.596601 kubelet[1961]: E0510 00:36:31.596551 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-58bc994dcc-2mzxg_calico-system(a7dabf68-04f9-478a-a255-1446cd585546)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-58bc994dcc-2mzxg_calico-system(a7dabf68-04f9-478a-a255-1446cd585546)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" podUID="a7dabf68-04f9-478a-a255-1446cd585546" May 10 00:36:31.599079 env[1215]: time="2025-05-10T00:36:31.599033405Z" level=error msg="Failed to destroy network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.599567 env[1215]: time="2025-05-10T00:36:31.599533950Z" level=error msg="encountered an error cleaning up failed sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.599668 env[1215]: time="2025-05-10T00:36:31.599598633Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hc94l,Uid:39a293e5-816d-4109-845c-1f22b79176b1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.600510 kubelet[1961]: E0510 00:36:31.600141 1961 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.600510 kubelet[1961]: E0510 00:36:31.600206 1961 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-hc94l" May 10 00:36:31.600510 kubelet[1961]: E0510 00:36:31.600237 1961 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-hc94l" May 10 00:36:31.600635 kubelet[1961]: E0510 00:36:31.600280 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-hc94l_kube-system(39a293e5-816d-4109-845c-1f22b79176b1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-hc94l_kube-system(39a293e5-816d-4109-845c-1f22b79176b1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hc94l" podUID="39a293e5-816d-4109-845c-1f22b79176b1" May 10 00:36:31.610650 env[1215]: time="2025-05-10T00:36:31.610571948Z" level=error msg="Failed to destroy network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.611030 env[1215]: time="2025-05-10T00:36:31.610998513Z" level=error msg="encountered an error cleaning up failed sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.611092 env[1215]: time="2025-05-10T00:36:31.611052125Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-wdbhf,Uid:e3eee2db-8034-4bf4-8367-fbe10e8f2c14,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.611406 kubelet[1961]: E0510 00:36:31.611333 1961 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.611599 kubelet[1961]: E0510 00:36:31.611419 1961 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" May 10 00:36:31.611599 kubelet[1961]: E0510 00:36:31.611443 1961 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" May 10 00:36:31.611599 kubelet[1961]: E0510 00:36:31.611502 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7c78d4657-wdbhf_calico-apiserver(e3eee2db-8034-4bf4-8367-fbe10e8f2c14)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7c78d4657-wdbhf_calico-apiserver(e3eee2db-8034-4bf4-8367-fbe10e8f2c14)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" podUID="e3eee2db-8034-4bf4-8367-fbe10e8f2c14" May 10 00:36:31.613663 env[1215]: time="2025-05-10T00:36:31.613577573Z" level=error msg="Failed to destroy network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.614075 env[1215]: time="2025-05-10T00:36:31.614038011Z" level=error msg="encountered an error cleaning up failed sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.614143 env[1215]: time="2025-05-10T00:36:31.614106100Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9gkns,Uid:932f65bf-ccfd-435f-86b4-1e2b5b34d9fe,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.614387 kubelet[1961]: E0510 00:36:31.614355 1961 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.614469 kubelet[1961]: E0510 00:36:31.614398 1961 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-9gkns" May 10 00:36:31.614469 kubelet[1961]: E0510 00:36:31.614416 1961 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-9gkns" May 10 00:36:31.614469 kubelet[1961]: E0510 00:36:31.614453 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-9gkns_kube-system(932f65bf-ccfd-435f-86b4-1e2b5b34d9fe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-9gkns_kube-system(932f65bf-ccfd-435f-86b4-1e2b5b34d9fe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-9gkns" podUID="932f65bf-ccfd-435f-86b4-1e2b5b34d9fe" May 10 00:36:31.617317 env[1215]: time="2025-05-10T00:36:31.617267187Z" level=error msg="Failed to destroy network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.617658 env[1215]: time="2025-05-10T00:36:31.617609143Z" level=error msg="encountered an error cleaning up failed sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.617807 env[1215]: time="2025-05-10T00:36:31.617672412Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-8jkqt,Uid:112fda21-21dd-48b3-8c0d-f5a5ae17309e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.617931 kubelet[1961]: E0510 00:36:31.617892 1961 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:31.617978 kubelet[1961]: E0510 00:36:31.617940 1961 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" May 10 00:36:31.617978 kubelet[1961]: E0510 00:36:31.617962 1961 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" May 10 00:36:31.618031 kubelet[1961]: E0510 00:36:31.618007 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7c78d4657-8jkqt_calico-apiserver(112fda21-21dd-48b3-8c0d-f5a5ae17309e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7c78d4657-8jkqt_calico-apiserver(112fda21-21dd-48b3-8c0d-f5a5ae17309e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" podUID="112fda21-21dd-48b3-8c0d-f5a5ae17309e" May 10 00:36:32.122712 kubelet[1961]: E0510 00:36:32.122650 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:32.123422 env[1215]: time="2025-05-10T00:36:32.123377518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:36:32.123849 kubelet[1961]: I0510 00:36:32.123812 1961 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:36:32.125761 env[1215]: time="2025-05-10T00:36:32.124431908Z" level=info msg="StopPodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\"" May 10 00:36:32.126969 kubelet[1961]: I0510 00:36:32.126149 1961 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:36:32.127063 env[1215]: time="2025-05-10T00:36:32.126561326Z" level=info msg="StopPodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\"" May 10 00:36:32.129201 kubelet[1961]: I0510 00:36:32.128366 1961 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:36:32.129292 env[1215]: time="2025-05-10T00:36:32.128805291Z" level=info msg="StopPodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\"" May 10 00:36:32.131255 kubelet[1961]: I0510 00:36:32.130939 1961 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:36:32.131529 env[1215]: time="2025-05-10T00:36:32.131498023Z" level=info msg="StopPodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\"" May 10 00:36:32.133060 kubelet[1961]: I0510 00:36:32.133040 1961 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:36:32.134222 env[1215]: time="2025-05-10T00:36:32.134169063Z" level=info msg="StopPodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\"" May 10 00:36:32.164410 env[1215]: time="2025-05-10T00:36:32.164316443Z" level=error msg="StopPodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" failed" error="failed to destroy network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:32.164671 kubelet[1961]: E0510 00:36:32.164615 1961 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:36:32.164778 kubelet[1961]: E0510 00:36:32.164713 1961 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813"} May 10 00:36:32.164811 kubelet[1961]: E0510 00:36:32.164795 1961 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"39a293e5-816d-4109-845c-1f22b79176b1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:32.165011 kubelet[1961]: E0510 00:36:32.164974 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"39a293e5-816d-4109-845c-1f22b79176b1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hc94l" podUID="39a293e5-816d-4109-845c-1f22b79176b1" May 10 00:36:32.171438 env[1215]: time="2025-05-10T00:36:32.171360656Z" level=error msg="StopPodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" failed" error="failed to destroy network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:32.171695 kubelet[1961]: E0510 00:36:32.171642 1961 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:36:32.171770 kubelet[1961]: E0510 00:36:32.171702 1961 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b"} May 10 00:36:32.171770 kubelet[1961]: E0510 00:36:32.171737 1961 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e3eee2db-8034-4bf4-8367-fbe10e8f2c14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:32.171770 kubelet[1961]: E0510 00:36:32.171764 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e3eee2db-8034-4bf4-8367-fbe10e8f2c14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" podUID="e3eee2db-8034-4bf4-8367-fbe10e8f2c14" May 10 00:36:32.175047 env[1215]: time="2025-05-10T00:36:32.174986930Z" level=error msg="StopPodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" failed" error="failed to destroy network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:32.175285 kubelet[1961]: E0510 00:36:32.175251 1961 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:36:32.175350 kubelet[1961]: E0510 00:36:32.175296 1961 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5"} May 10 00:36:32.175350 kubelet[1961]: E0510 00:36:32.175330 1961 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:32.175446 kubelet[1961]: E0510 00:36:32.175359 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-9gkns" podUID="932f65bf-ccfd-435f-86b4-1e2b5b34d9fe" May 10 00:36:32.184143 env[1215]: time="2025-05-10T00:36:32.184070060Z" level=error msg="StopPodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" failed" error="failed to destroy network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:32.184398 kubelet[1961]: E0510 00:36:32.184357 1961 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:36:32.184398 kubelet[1961]: E0510 00:36:32.184398 1961 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee"} May 10 00:36:32.184596 kubelet[1961]: E0510 00:36:32.184423 1961 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a7dabf68-04f9-478a-a255-1446cd585546\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:32.184596 kubelet[1961]: E0510 00:36:32.184442 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a7dabf68-04f9-478a-a255-1446cd585546\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" podUID="a7dabf68-04f9-478a-a255-1446cd585546" May 10 00:36:32.187081 env[1215]: time="2025-05-10T00:36:32.187015589Z" level=error msg="StopPodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" failed" error="failed to destroy network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:32.187268 kubelet[1961]: E0510 00:36:32.187227 1961 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:36:32.187344 kubelet[1961]: E0510 00:36:32.187293 1961 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569"} May 10 00:36:32.187344 kubelet[1961]: E0510 00:36:32.187336 1961 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"112fda21-21dd-48b3-8c0d-f5a5ae17309e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:32.187421 kubelet[1961]: E0510 00:36:32.187364 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"112fda21-21dd-48b3-8c0d-f5a5ae17309e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" podUID="112fda21-21dd-48b3-8c0d-f5a5ae17309e" May 10 00:36:33.053909 systemd[1]: Created slice kubepods-besteffort-pod27d06b5b_7b04_4f47_8e55_36ac8c0c3647.slice. May 10 00:36:33.056002 env[1215]: time="2025-05-10T00:36:33.055953343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b67p,Uid:27d06b5b-7b04-4f47-8e55-36ac8c0c3647,Namespace:calico-system,Attempt:0,}" May 10 00:36:33.523014 env[1215]: time="2025-05-10T00:36:33.522944460Z" level=error msg="Failed to destroy network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:33.523350 env[1215]: time="2025-05-10T00:36:33.523315760Z" level=error msg="encountered an error cleaning up failed sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:33.523387 env[1215]: time="2025-05-10T00:36:33.523361947Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b67p,Uid:27d06b5b-7b04-4f47-8e55-36ac8c0c3647,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:33.523648 kubelet[1961]: E0510 00:36:33.523587 1961 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:33.523986 kubelet[1961]: E0510 00:36:33.523658 1961 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2b67p" May 10 00:36:33.523986 kubelet[1961]: E0510 00:36:33.523679 1961 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2b67p" May 10 00:36:33.523986 kubelet[1961]: E0510 00:36:33.523736 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2b67p_calico-system(27d06b5b-7b04-4f47-8e55-36ac8c0c3647)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2b67p_calico-system(27d06b5b-7b04-4f47-8e55-36ac8c0c3647)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:33.525136 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd-shm.mount: Deactivated successfully. May 10 00:36:34.138652 kubelet[1961]: I0510 00:36:34.138611 1961 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:36:34.139288 env[1215]: time="2025-05-10T00:36:34.139237633Z" level=info msg="StopPodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\"" May 10 00:36:34.165531 env[1215]: time="2025-05-10T00:36:34.165452857Z" level=error msg="StopPodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" failed" error="failed to destroy network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:36:34.165834 kubelet[1961]: E0510 00:36:34.165743 1961 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:36:34.165927 kubelet[1961]: E0510 00:36:34.165879 1961 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd"} May 10 00:36:34.165960 kubelet[1961]: E0510 00:36:34.165925 1961 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:36:34.166021 kubelet[1961]: E0510 00:36:34.165953 1961 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"27d06b5b-7b04-4f47-8e55-36ac8c0c3647\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2b67p" podUID="27d06b5b-7b04-4f47-8e55-36ac8c0c3647" May 10 00:36:36.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.17:22-10.0.0.1:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:36.374057 systemd[1]: Started sshd@7-10.0.0.17:22-10.0.0.1:34502.service. May 10 00:36:36.375716 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:36:36.375802 kernel: audit: type=1130 audit(1746837396.373:999): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.17:22-10.0.0.1:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:36.425661 sshd[3053]: Accepted publickey for core from 10.0.0.1 port 34502 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:36.424000 audit[3053]: USER_ACCT pid=3053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.429011 sshd[3053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:36.426000 audit[3053]: CRED_ACQ pid=3053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.434567 kernel: audit: type=1101 audit(1746837396.424:1000): pid=3053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.434745 kernel: audit: type=1103 audit(1746837396.426:1001): pid=3053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.434796 kernel: audit: type=1006 audit(1746837396.426:1002): pid=3053 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:36:36.437037 kernel: audit: type=1300 audit(1746837396.426:1002): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff1f2f100 a2=3 a3=0 items=0 ppid=1 pid=3053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.426000 audit[3053]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff1f2f100 a2=3 a3=0 items=0 ppid=1 pid=3053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:36.441086 kernel: audit: type=1327 audit(1746837396.426:1002): proctitle=737368643A20636F7265205B707269765D May 10 00:36:36.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:36.556585 systemd-logind[1205]: New session 8 of user core. May 10 00:36:36.557669 systemd[1]: Started session-8.scope. May 10 00:36:36.561000 audit[3053]: USER_START pid=3053 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.568728 kernel: audit: type=1105 audit(1746837396.561:1003): pid=3053 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.570000 audit[3055]: CRED_ACQ pid=3055 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.575714 kernel: audit: type=1103 audit(1746837396.570:1004): pid=3055 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.723577 sshd[3053]: pam_unix(sshd:session): session closed for user core May 10 00:36:36.724000 audit[3053]: USER_END pid=3053 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.724000 audit[3053]: CRED_DISP pid=3053 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.733313 kernel: audit: type=1106 audit(1746837396.724:1005): pid=3053 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.733381 kernel: audit: type=1104 audit(1746837396.724:1006): pid=3053 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:36.733609 systemd[1]: sshd@7-10.0.0.17:22-10.0.0.1:34502.service: Deactivated successfully. May 10 00:36:36.734344 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:36:36.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.17:22-10.0.0.1:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:36.735250 systemd-logind[1205]: Session 8 logged out. Waiting for processes to exit. May 10 00:36:36.736109 systemd-logind[1205]: Removed session 8. May 10 00:36:39.873170 kubelet[1961]: I0510 00:36:39.872938 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:39.873910 kubelet[1961]: E0510 00:36:39.873870 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:39.927000 audit[3067]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:39.927000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc87529b60 a2=0 a3=7ffc87529b4c items=0 ppid=2147 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:39.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:39.932000 audit[3067]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3067 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:39.932000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc87529b60 a2=0 a3=7ffc87529b4c items=0 ppid=2147 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:39.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:40.154976 kubelet[1961]: E0510 00:36:40.154903 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:40.343371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3440889720.mount: Deactivated successfully. May 10 00:36:40.935357 env[1215]: time="2025-05-10T00:36:40.935256493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:40.938435 env[1215]: time="2025-05-10T00:36:40.938339407Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:40.940424 env[1215]: time="2025-05-10T00:36:40.940389657Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:40.942451 env[1215]: time="2025-05-10T00:36:40.942416402Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:40.943112 env[1215]: time="2025-05-10T00:36:40.943055084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:36:40.954036 env[1215]: time="2025-05-10T00:36:40.953946217Z" level=info msg="CreateContainer within sandbox \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:36:41.018941 env[1215]: time="2025-05-10T00:36:41.018850452Z" level=info msg="CreateContainer within sandbox \"2e287cc34eafd5a0860c7378eff7774c8dedbce7fd50912ec731543bf4ab8d3f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bd768bc39ef881edb4e10a77c832940a6a54c74122a8bc83fe2476a264ecc0b3\"" May 10 00:36:41.019549 env[1215]: time="2025-05-10T00:36:41.019506126Z" level=info msg="StartContainer for \"bd768bc39ef881edb4e10a77c832940a6a54c74122a8bc83fe2476a264ecc0b3\"" May 10 00:36:41.036631 systemd[1]: Started cri-containerd-bd768bc39ef881edb4e10a77c832940a6a54c74122a8bc83fe2476a264ecc0b3.scope. May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6249c44858 items=0 ppid=2388 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373638626333396566383831656462346531306137376338333239 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit: BPF prog-id=139 op=LOAD May 10 00:36:41.053000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003046f8 items=0 ppid=2388 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373638626333396566383831656462346531306137376338333239 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit: BPF prog-id=140 op=LOAD May 10 00:36:41.053000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000304748 items=0 ppid=2388 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373638626333396566383831656462346531306137376338333239 May 10 00:36:41.053000 audit: BPF prog-id=140 op=UNLOAD May 10 00:36:41.053000 audit: BPF prog-id=139 op=UNLOAD May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:41.053000 audit: BPF prog-id=141 op=LOAD May 10 00:36:41.053000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003047d8 items=0 ppid=2388 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373638626333396566383831656462346531306137376338333239 May 10 00:36:41.156022 env[1215]: time="2025-05-10T00:36:41.155941918Z" level=info msg="StartContainer for \"bd768bc39ef881edb4e10a77c832940a6a54c74122a8bc83fe2476a264ecc0b3\" returns successfully" May 10 00:36:41.211529 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:36:41.211774 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:36:41.729302 systemd[1]: Started sshd@8-10.0.0.17:22-10.0.0.1:54758.service. May 10 00:36:41.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.17:22-10.0.0.1:54758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:41.734552 kernel: kauditd_printk_skb: 50 callbacks suppressed May 10 00:36:41.734604 kernel: audit: type=1130 audit(1746837401.728:1016): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.17:22-10.0.0.1:54758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:41.771000 audit[3137]: USER_ACCT pid=3137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.772291 sshd[3137]: Accepted publickey for core from 10.0.0.1 port 54758 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:41.775000 audit[3137]: CRED_ACQ pid=3137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.776865 sshd[3137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:41.780184 kernel: audit: type=1101 audit(1746837401.771:1017): pid=3137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.780309 kernel: audit: type=1103 audit(1746837401.775:1018): pid=3137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.780333 kernel: audit: type=1006 audit(1746837401.775:1019): pid=3137 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:36:41.781064 systemd-logind[1205]: New session 9 of user core. May 10 00:36:41.781990 systemd[1]: Started session-9.scope. May 10 00:36:41.782528 kernel: audit: type=1300 audit(1746837401.775:1019): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7422a380 a2=3 a3=0 items=0 ppid=1 pid=3137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.775000 audit[3137]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7422a380 a2=3 a3=0 items=0 ppid=1 pid=3137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:41.786586 kernel: audit: type=1327 audit(1746837401.775:1019): proctitle=737368643A20636F7265205B707269765D May 10 00:36:41.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:41.787997 kernel: audit: type=1105 audit(1746837401.785:1020): pid=3137 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.785000 audit[3137]: USER_START pid=3137 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.792260 kernel: audit: type=1103 audit(1746837401.786:1021): pid=3139 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.786000 audit[3139]: CRED_ACQ pid=3139 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.895303 sshd[3137]: pam_unix(sshd:session): session closed for user core May 10 00:36:41.895000 audit[3137]: USER_END pid=3137 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.897264 systemd[1]: sshd@8-10.0.0.17:22-10.0.0.1:54758.service: Deactivated successfully. May 10 00:36:41.897953 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:36:41.895000 audit[3137]: CRED_DISP pid=3137 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.902249 systemd-logind[1205]: Session 9 logged out. Waiting for processes to exit. May 10 00:36:41.902944 systemd-logind[1205]: Removed session 9. May 10 00:36:41.903999 kernel: audit: type=1106 audit(1746837401.895:1022): pid=3137 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.904051 kernel: audit: type=1104 audit(1746837401.895:1023): pid=3137 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:41.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.17:22-10.0.0.1:54758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:42.167006 kubelet[1961]: E0510 00:36:42.166960 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:42.188670 systemd[1]: run-containerd-runc-k8s.io-bd768bc39ef881edb4e10a77c832940a6a54c74122a8bc83fe2476a264ecc0b3-runc.rQO5LM.mount: Deactivated successfully. May 10 00:36:42.509000 audit[3204]: AVC avc: denied { write } for pid=3204 comm="tee" name="fd" dev="proc" ino=24145 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.509000 audit[3204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd6f9fa2a a2=241 a3=1b6 items=1 ppid=3181 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.509000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:36:42.509000 audit: PATH item=0 name="/dev/fd/63" inode=23457 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.514000 audit[3219]: AVC avc: denied { write } for pid=3219 comm="tee" name="fd" dev="proc" ino=24154 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.514000 audit[3219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdaef0ea2a a2=241 a3=1b6 items=1 ppid=3197 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.514000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:36:42.514000 audit: PATH item=0 name="/dev/fd/63" inode=24151 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.514000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.517000 audit[3212]: AVC avc: denied { write } for pid=3212 comm="tee" name="fd" dev="proc" ino=24160 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.517000 audit[3212]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeaec2a2b a2=241 a3=1b6 items=1 ppid=3184 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.517000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:36:42.517000 audit: PATH item=0 name="/dev/fd/63" inode=23466 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.530000 audit[3233]: AVC avc: denied { write } for pid=3233 comm="tee" name="fd" dev="proc" ino=25075 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.531000 audit[3231]: AVC avc: denied { write } for pid=3231 comm="tee" name="fd" dev="proc" ino=25078 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.532000 audit[3237]: AVC avc: denied { write } for pid=3237 comm="tee" name="fd" dev="proc" ino=25081 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.532000 audit[3237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8ac51a2c a2=241 a3=1b6 items=1 ppid=3183 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.532000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:36:42.531000 audit[3231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffcf61a1b a2=241 a3=1b6 items=1 ppid=3190 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.532000 audit: PATH item=0 name="/dev/fd/63" inode=25070 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.532000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.531000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:36:42.531000 audit: PATH item=0 name="/dev/fd/63" inode=24162 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.530000 audit[3233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd33c1a1a a2=241 a3=1b6 items=1 ppid=3187 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.530000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:36:42.530000 audit: PATH item=0 name="/dev/fd/63" inode=22395 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.530000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.552000 audit[3256]: AVC avc: denied { write } for pid=3256 comm="tee" name="fd" dev="proc" ino=24167 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:36:42.552000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb2157a2a a2=241 a3=1b6 items=1 ppid=3192 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.552000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:36:42.552000 audit: PATH item=0 name="/dev/fd/63" inode=25084 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:36:42.552000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.635000 audit: BPF prog-id=142 op=LOAD May 10 00:36:42.635000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdda035a40 a2=98 a3=3 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.635000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.636000 audit: BPF prog-id=142 op=UNLOAD May 10 00:36:42.637000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.637000 audit: BPF prog-id=143 op=LOAD May 10 00:36:42.637000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdda035820 a2=74 a3=540051 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.637000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.638000 audit: BPF prog-id=143 op=UNLOAD May 10 00:36:42.638000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.638000 audit: BPF prog-id=144 op=LOAD May 10 00:36:42.638000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdda035850 a2=94 a3=2 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.639000 audit: BPF prog-id=144 op=UNLOAD May 10 00:36:42.759000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit: BPF prog-id=145 op=LOAD May 10 00:36:42.759000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdda035710 a2=40 a3=1 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.759000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.759000 audit: BPF prog-id=145 op=UNLOAD May 10 00:36:42.759000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.759000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdda0357e0 a2=50 a3=7ffdda0358c0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.759000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda035720 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda035750 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda035660 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda035770 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda035750 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda035740 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda035770 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda035750 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda035770 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdda035740 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdda0357b0 a2=28 a3=0 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdda035560 a2=50 a3=1 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit: BPF prog-id=146 op=LOAD May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdda035560 a2=94 a3=5 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit: BPF prog-id=146 op=UNLOAD May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdda035610 a2=50 a3=1 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdda035730 a2=4 a3=38 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.767000 audit[3297]: AVC avc: denied { confidentiality } for pid=3297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:36:42.767000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdda035780 a2=94 a3=6 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { confidentiality } for pid=3297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:36:42.768000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdda034f30 a2=94 a3=83 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.768000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { perfmon } for pid=3297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.768000 audit[3297]: AVC avc: denied { confidentiality } for pid=3297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:36:42.768000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdda034f30 a2=94 a3=83 items=0 ppid=3185 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.768000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit: BPF prog-id=147 op=LOAD May 10 00:36:42.775000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff202b6e0 a2=98 a3=1999999999999999 items=0 ppid=3185 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.775000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:36:42.775000 audit: BPF prog-id=147 op=UNLOAD May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit: BPF prog-id=148 op=LOAD May 10 00:36:42.775000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff202b5c0 a2=74 a3=ffff items=0 ppid=3185 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.775000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:36:42.775000 audit: BPF prog-id=148 op=UNLOAD May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.775000 audit: BPF prog-id=149 op=LOAD May 10 00:36:42.775000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff202b600 a2=40 a3=7ffff202b7e0 items=0 ppid=3185 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.775000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:36:42.775000 audit: BPF prog-id=149 op=UNLOAD May 10 00:36:42.815054 systemd-networkd[1040]: vxlan.calico: Link UP May 10 00:36:42.815062 systemd-networkd[1040]: vxlan.calico: Gained carrier May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit: BPF prog-id=150 op=LOAD May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff65803e20 a2=98 a3=ffffffff items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit: BPF prog-id=150 op=UNLOAD May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit: BPF prog-id=151 op=LOAD May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff65803c30 a2=74 a3=540051 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit: BPF prog-id=151 op=UNLOAD May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit: BPF prog-id=152 op=LOAD May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff65803c60 a2=94 a3=2 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit: BPF prog-id=152 op=UNLOAD May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff65803b30 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff65803b60 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff65803a70 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff65803b80 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff65803b60 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff65803b50 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff65803b80 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff65803b60 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff65803b80 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff65803b50 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff65803bc0 a2=28 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.830000 audit: BPF prog-id=153 op=LOAD May 10 00:36:42.830000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff65803a30 a2=40 a3=0 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.830000 audit: BPF prog-id=153 op=UNLOAD May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff65803a20 a2=50 a3=2800 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff65803a20 a2=50 a3=2800 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit: BPF prog-id=154 op=LOAD May 10 00:36:42.831000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff65803240 a2=94 a3=2 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.831000 audit: BPF prog-id=154 op=UNLOAD May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.831000 audit: BPF prog-id=155 op=LOAD May 10 00:36:42.831000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff65803340 a2=94 a3=30 items=0 ppid=3185 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit: BPF prog-id=156 op=LOAD May 10 00:36:42.833000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa71d75f0 a2=98 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.833000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.833000 audit: BPF prog-id=156 op=UNLOAD May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit: BPF prog-id=157 op=LOAD May 10 00:36:42.833000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa71d73d0 a2=74 a3=540051 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.833000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.833000 audit: BPF prog-id=157 op=UNLOAD May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.833000 audit: BPF prog-id=158 op=LOAD May 10 00:36:42.833000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa71d7400 a2=94 a3=2 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.833000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.833000 audit: BPF prog-id=158 op=UNLOAD May 10 00:36:42.938000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit: BPF prog-id=159 op=LOAD May 10 00:36:42.938000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa71d72c0 a2=40 a3=1 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.938000 audit: BPF prog-id=159 op=UNLOAD May 10 00:36:42.938000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.938000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa71d7390 a2=50 a3=7fffa71d7470 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa71d72d0 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa71d7300 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa71d7210 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa71d7320 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa71d7300 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa71d72f0 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa71d7320 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa71d7300 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa71d7320 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa71d72f0 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa71d7360 a2=28 a3=0 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa71d7110 a2=50 a3=1 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit: BPF prog-id=160 op=LOAD May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa71d7110 a2=94 a3=5 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit: BPF prog-id=160 op=UNLOAD May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa71d71c0 a2=50 a3=1 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa71d72e0 a2=4 a3=38 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.946000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:36:42.946000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa71d7330 a2=94 a3=6 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:36:42.947000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa71d6ae0 a2=94 a3=83 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:36:42.947000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa71d6ae0 a2=94 a3=83 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa71d8520 a2=10 a3=208 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa71d83c0 a2=10 a3=3 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa71d8360 a2=10 a3=3 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.947000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:42.947000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa71d8360 a2=10 a3=7 items=0 ppid=3185 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:36:42.954000 audit: BPF prog-id=155 op=UNLOAD May 10 00:36:42.997000 audit[3365]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:42.997000 audit[3365]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc6e4578a0 a2=0 a3=7ffc6e45788c items=0 ppid=3185 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:42.997000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:43.003000 audit[3367]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:43.003000 audit[3367]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd9b09c280 a2=0 a3=7ffd9b09c26c items=0 ppid=3185 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:43.004000 audit[3369]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3369 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:43.004000 audit[3369]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcb65d7ed0 a2=0 a3=7ffcb65d7ebc items=0 ppid=3185 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.004000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:43.006000 audit[3366]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:43.006000 audit[3366]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffddfb25d70 a2=0 a3=7ffddfb25d5c items=0 ppid=3185 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.006000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:43.047000 env[1215]: time="2025-05-10T00:36:43.046829450Z" level=info msg="StopPodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\"" May 10 00:36:43.114185 kubelet[1961]: I0510 00:36:43.113846 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dq4nc" podStartSLOduration=3.064286571 podStartE2EDuration="24.11382536s" podCreationTimestamp="2025-05-10 00:36:19 +0000 UTC" firstStartedPulling="2025-05-10 00:36:19.8946342 +0000 UTC m=+11.962381408" lastFinishedPulling="2025-05-10 00:36:40.944172989 +0000 UTC m=+33.011920197" observedRunningTime="2025-05-10 00:36:42.182463603 +0000 UTC m=+34.250210831" watchObservedRunningTime="2025-05-10 00:36:43.11382536 +0000 UTC m=+35.181572568" May 10 00:36:43.169881 kubelet[1961]: E0510 00:36:43.169427 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.113 [INFO][3390] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.114 [INFO][3390] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" iface="eth0" netns="/var/run/netns/cni-10427618-80eb-937e-5074-d8a5ac4b8859" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.114 [INFO][3390] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" iface="eth0" netns="/var/run/netns/cni-10427618-80eb-937e-5074-d8a5ac4b8859" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.117 [INFO][3390] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" iface="eth0" netns="/var/run/netns/cni-10427618-80eb-937e-5074-d8a5ac4b8859" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.117 [INFO][3390] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.117 [INFO][3390] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.248 [INFO][3398] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.259 [INFO][3398] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.264 [INFO][3398] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.321 [WARNING][3398] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.321 [INFO][3398] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.323 [INFO][3398] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:43.328169 env[1215]: 2025-05-10 00:36:43.326 [INFO][3390] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:36:43.330478 systemd[1]: run-netns-cni\x2d10427618\x2d80eb\x2d937e\x2d5074\x2dd8a5ac4b8859.mount: Deactivated successfully. May 10 00:36:43.331231 env[1215]: time="2025-05-10T00:36:43.331163599Z" level=info msg="TearDown network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" successfully" May 10 00:36:43.331231 env[1215]: time="2025-05-10T00:36:43.331205898Z" level=info msg="StopPodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" returns successfully" May 10 00:36:43.332168 env[1215]: time="2025-05-10T00:36:43.332118776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-wdbhf,Uid:e3eee2db-8034-4bf4-8367-fbe10e8f2c14,Namespace:calico-apiserver,Attempt:1,}" May 10 00:36:43.841310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:36:43.841431 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliada4b791597: link becomes ready May 10 00:36:43.837368 systemd-networkd[1040]: caliada4b791597: Link UP May 10 00:36:43.841770 systemd-networkd[1040]: caliada4b791597: Gained carrier May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.695 [INFO][3430] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0 calico-apiserver-7c78d4657- calico-apiserver e3eee2db-8034-4bf4-8367-fbe10e8f2c14 855 0 2025-05-10 00:36:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c78d4657 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7c78d4657-wdbhf eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliada4b791597 [] []}} ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.696 [INFO][3430] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.737 [INFO][3446] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" HandleID="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.749 [INFO][3446] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" HandleID="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002800f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7c78d4657-wdbhf", "timestamp":"2025-05-10 00:36:43.737751634 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.749 [INFO][3446] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.749 [INFO][3446] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.749 [INFO][3446] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.752 [INFO][3446] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.768 [INFO][3446] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.772 [INFO][3446] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.774 [INFO][3446] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.776 [INFO][3446] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.776 [INFO][3446] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.778 [INFO][3446] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69 May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.795 [INFO][3446] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.832 [INFO][3446] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.833 [INFO][3446] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" host="localhost" May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.833 [INFO][3446] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:43.870540 env[1215]: 2025-05-10 00:36:43.833 [INFO][3446] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" HandleID="k8s-pod-network.766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.871174 env[1215]: 2025-05-10 00:36:43.835 [INFO][3430] cni-plugin/k8s.go 386: Populated endpoint ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3eee2db-8034-4bf4-8367-fbe10e8f2c14", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7c78d4657-wdbhf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliada4b791597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:43.871174 env[1215]: 2025-05-10 00:36:43.835 [INFO][3430] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.871174 env[1215]: 2025-05-10 00:36:43.835 [INFO][3430] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliada4b791597 ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.871174 env[1215]: 2025-05-10 00:36:43.841 [INFO][3430] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.871174 env[1215]: 2025-05-10 00:36:43.841 [INFO][3430] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3eee2db-8034-4bf4-8367-fbe10e8f2c14", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69", Pod:"calico-apiserver-7c78d4657-wdbhf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliada4b791597", MAC:"36:87:36:36:4f:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:43.871174 env[1215]: 2025-05-10 00:36:43.868 [INFO][3430] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-wdbhf" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:36:43.879000 audit[3467]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3467 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:43.879000 audit[3467]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffdf5f6b7b0 a2=0 a3=7ffdf5f6b79c items=0 ppid=3185 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.879000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:43.903268 env[1215]: time="2025-05-10T00:36:43.903182389Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:43.903268 env[1215]: time="2025-05-10T00:36:43.903227964Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:43.903268 env[1215]: time="2025-05-10T00:36:43.903237222Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:43.903498 env[1215]: time="2025-05-10T00:36:43.903428171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69 pid=3476 runtime=io.containerd.runc.v2 May 10 00:36:43.915851 systemd[1]: Started cri-containerd-766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69.scope. May 10 00:36:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.927000 audit: BPF prog-id=161 op=LOAD May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3476 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363034346638356536613862303235313064323565396165366334 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3476 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363034346638356536613862303235313064323565396165366334 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit: BPF prog-id=162 op=LOAD May 10 00:36:43.928000 audit[3486]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001a1ae0 items=0 ppid=3476 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363034346638356536613862303235313064323565396165366334 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit: BPF prog-id=163 op=LOAD May 10 00:36:43.928000 audit[3486]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001a1b28 items=0 ppid=3476 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363034346638356536613862303235313064323565396165366334 May 10 00:36:43.928000 audit: BPF prog-id=163 op=UNLOAD May 10 00:36:43.928000 audit: BPF prog-id=162 op=UNLOAD May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:43.928000 audit: BPF prog-id=164 op=LOAD May 10 00:36:43.928000 audit[3486]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001a1f38 items=0 ppid=3476 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:43.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363034346638356536613862303235313064323565396165366334 May 10 00:36:43.930295 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:36:43.952268 env[1215]: time="2025-05-10T00:36:43.952212769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-wdbhf,Uid:e3eee2db-8034-4bf4-8367-fbe10e8f2c14,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69\"" May 10 00:36:43.953601 env[1215]: time="2025-05-10T00:36:43.953570895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:36:44.704863 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL May 10 00:36:45.046223 env[1215]: time="2025-05-10T00:36:45.046090615Z" level=info msg="StopPodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\"" May 10 00:36:45.046656 env[1215]: time="2025-05-10T00:36:45.046519972Z" level=info msg="StopPodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\"" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.096 [INFO][3549] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.096 [INFO][3549] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" iface="eth0" netns="/var/run/netns/cni-5a956578-1033-104d-649a-6d949a7aec27" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.096 [INFO][3549] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" iface="eth0" netns="/var/run/netns/cni-5a956578-1033-104d-649a-6d949a7aec27" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.096 [INFO][3549] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" iface="eth0" netns="/var/run/netns/cni-5a956578-1033-104d-649a-6d949a7aec27" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.096 [INFO][3549] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.096 [INFO][3549] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.128 [INFO][3564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.129 [INFO][3564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.129 [INFO][3564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.134 [WARNING][3564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.134 [INFO][3564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.135 [INFO][3564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:45.138972 env[1215]: 2025-05-10 00:36:45.137 [INFO][3549] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:36:45.141225 systemd[1]: run-netns-cni\x2d5a956578\x2d1033\x2d104d\x2d649a\x2d6d949a7aec27.mount: Deactivated successfully. May 10 00:36:45.142763 env[1215]: time="2025-05-10T00:36:45.142199740Z" level=info msg="TearDown network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" successfully" May 10 00:36:45.142763 env[1215]: time="2025-05-10T00:36:45.142752038Z" level=info msg="StopPodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" returns successfully" May 10 00:36:45.143153 kubelet[1961]: E0510 00:36:45.143120 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:45.143616 env[1215]: time="2025-05-10T00:36:45.143581107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9gkns,Uid:932f65bf-ccfd-435f-86b4-1e2b5b34d9fe,Namespace:kube-system,Attempt:1,}" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.103 [INFO][3548] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.103 [INFO][3548] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" iface="eth0" netns="/var/run/netns/cni-85ea0794-7298-5b07-994a-d6c05501bbc8" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.103 [INFO][3548] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" iface="eth0" netns="/var/run/netns/cni-85ea0794-7298-5b07-994a-d6c05501bbc8" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.103 [INFO][3548] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" iface="eth0" netns="/var/run/netns/cni-85ea0794-7298-5b07-994a-d6c05501bbc8" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.103 [INFO][3548] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.103 [INFO][3548] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.137 [INFO][3570] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.137 [INFO][3570] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.137 [INFO][3570] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.143 [WARNING][3570] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.143 [INFO][3570] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.145 [INFO][3570] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:45.148654 env[1215]: 2025-05-10 00:36:45.147 [INFO][3548] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:36:45.149573 env[1215]: time="2025-05-10T00:36:45.148841830Z" level=info msg="TearDown network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" successfully" May 10 00:36:45.149573 env[1215]: time="2025-05-10T00:36:45.148878179Z" level=info msg="StopPodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" returns successfully" May 10 00:36:45.149573 env[1215]: time="2025-05-10T00:36:45.149544422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b67p,Uid:27d06b5b-7b04-4f47-8e55-36ac8c0c3647,Namespace:calico-system,Attempt:1,}" May 10 00:36:45.152277 systemd[1]: run-netns-cni\x2d85ea0794\x2d7298\x2d5b07\x2d994a\x2dd6c05501bbc8.mount: Deactivated successfully. May 10 00:36:45.264637 systemd-networkd[1040]: cali1180944647d: Link UP May 10 00:36:45.267734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:36:45.267790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1180944647d: link becomes ready May 10 00:36:45.268011 systemd-networkd[1040]: cali1180944647d: Gained carrier May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.197 [INFO][3580] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--9gkns-eth0 coredns-668d6bf9bc- kube-system 932f65bf-ccfd-435f-86b4-1e2b5b34d9fe 876 0 2025-05-10 00:36:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-9gkns eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1180944647d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.197 [INFO][3580] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.226 [INFO][3608] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" HandleID="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.235 [INFO][3608] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" HandleID="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00058d4d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-9gkns", "timestamp":"2025-05-10 00:36:45.226472575 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.235 [INFO][3608] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.235 [INFO][3608] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.235 [INFO][3608] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.237 [INFO][3608] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.240 [INFO][3608] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.246 [INFO][3608] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.248 [INFO][3608] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.250 [INFO][3608] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.250 [INFO][3608] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.252 [INFO][3608] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6 May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.256 [INFO][3608] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.260 [INFO][3608] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.261 [INFO][3608] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" host="localhost" May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.261 [INFO][3608] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:45.279369 env[1215]: 2025-05-10 00:36:45.261 [INFO][3608] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" HandleID="k8s-pod-network.4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.280035 env[1215]: 2025-05-10 00:36:45.263 [INFO][3580] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9gkns-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-9gkns", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1180944647d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:45.280035 env[1215]: 2025-05-10 00:36:45.263 [INFO][3580] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.280035 env[1215]: 2025-05-10 00:36:45.263 [INFO][3580] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1180944647d ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.280035 env[1215]: 2025-05-10 00:36:45.268 [INFO][3580] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.280035 env[1215]: 2025-05-10 00:36:45.268 [INFO][3580] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9gkns-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6", Pod:"coredns-668d6bf9bc-9gkns", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1180944647d", MAC:"9a:db:ac:2e:e7:cf", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:45.280035 env[1215]: 2025-05-10 00:36:45.277 [INFO][3580] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6" Namespace="kube-system" Pod="coredns-668d6bf9bc-9gkns" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:36:45.287000 audit[3638]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:45.287000 audit[3638]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe2608c520 a2=0 a3=7ffe2608c50c items=0 ppid=3185 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.287000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:45.292513 env[1215]: time="2025-05-10T00:36:45.292410280Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:45.292513 env[1215]: time="2025-05-10T00:36:45.292469651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:45.292792 env[1215]: time="2025-05-10T00:36:45.292482605Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:45.292792 env[1215]: time="2025-05-10T00:36:45.292661612Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6 pid=3647 runtime=io.containerd.runc.v2 May 10 00:36:45.309153 systemd[1]: run-containerd-runc-k8s.io-4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6-runc.Sj6lWU.mount: Deactivated successfully. May 10 00:36:45.311466 systemd[1]: Started cri-containerd-4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6.scope. May 10 00:36:45.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.320000 audit: BPF prog-id=165 op=LOAD May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3647 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353365373962656434643462386263653762663638346434346136 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3647 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353365373962656434643462386263653762663638346434346136 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit: BPF prog-id=166 op=LOAD May 10 00:36:45.321000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023c490 items=0 ppid=3647 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353365373962656434643462386263653762663638346434346136 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit: BPF prog-id=167 op=LOAD May 10 00:36:45.321000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023c4d8 items=0 ppid=3647 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353365373962656434643462386263653762663638346434346136 May 10 00:36:45.321000 audit: BPF prog-id=167 op=UNLOAD May 10 00:36:45.321000 audit: BPF prog-id=166 op=UNLOAD May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { perfmon } for pid=3658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit[3658]: AVC avc: denied { bpf } for pid=3658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.321000 audit: BPF prog-id=168 op=LOAD May 10 00:36:45.321000 audit[3658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023c8e8 items=0 ppid=3647 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353365373962656434643462386263653762663638346434346136 May 10 00:36:45.323093 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:36:45.344765 env[1215]: time="2025-05-10T00:36:45.344662396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-9gkns,Uid:932f65bf-ccfd-435f-86b4-1e2b5b34d9fe,Namespace:kube-system,Attempt:1,} returns sandbox id \"4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6\"" May 10 00:36:45.346097 kubelet[1961]: E0510 00:36:45.346064 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:45.347817 env[1215]: time="2025-05-10T00:36:45.347778225Z" level=info msg="CreateContainer within sandbox \"4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:36:45.369468 systemd-networkd[1040]: calic756f10535f: Link UP May 10 00:36:45.370886 systemd-networkd[1040]: calic756f10535f: Gained carrier May 10 00:36:45.371734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic756f10535f: link becomes ready May 10 00:36:45.379970 env[1215]: time="2025-05-10T00:36:45.379896398Z" level=info msg="CreateContainer within sandbox \"4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"054586f317ee600cfc85b304839d24560e3588130b4ebe565e092da2b84430f2\"" May 10 00:36:45.380727 env[1215]: time="2025-05-10T00:36:45.380672748Z" level=info msg="StartContainer for \"054586f317ee600cfc85b304839d24560e3588130b4ebe565e092da2b84430f2\"" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.209 [INFO][3591] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--2b67p-eth0 csi-node-driver- calico-system 27d06b5b-7b04-4f47-8e55-36ac8c0c3647 877 0 2025-05-10 00:36:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-2b67p eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic756f10535f [] []}} ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.210 [INFO][3591] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.241 [INFO][3615] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" HandleID="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.249 [INFO][3615] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" HandleID="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003e2d60), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-2b67p", "timestamp":"2025-05-10 00:36:45.241204951 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.249 [INFO][3615] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.261 [INFO][3615] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.261 [INFO][3615] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.338 [INFO][3615] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.342 [INFO][3615] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.347 [INFO][3615] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.350 [INFO][3615] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.353 [INFO][3615] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.353 [INFO][3615] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.355 [INFO][3615] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646 May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.359 [INFO][3615] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.364 [INFO][3615] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.364 [INFO][3615] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" host="localhost" May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.364 [INFO][3615] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:45.387822 env[1215]: 2025-05-10 00:36:45.364 [INFO][3615] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" HandleID="k8s-pod-network.efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.388415 env[1215]: 2025-05-10 00:36:45.367 [INFO][3591] cni-plugin/k8s.go 386: Populated endpoint ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2b67p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27d06b5b-7b04-4f47-8e55-36ac8c0c3647", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-2b67p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic756f10535f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:45.388415 env[1215]: 2025-05-10 00:36:45.368 [INFO][3591] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.388415 env[1215]: 2025-05-10 00:36:45.368 [INFO][3591] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic756f10535f ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.388415 env[1215]: 2025-05-10 00:36:45.370 [INFO][3591] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.388415 env[1215]: 2025-05-10 00:36:45.371 [INFO][3591] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2b67p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27d06b5b-7b04-4f47-8e55-36ac8c0c3647", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646", Pod:"csi-node-driver-2b67p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic756f10535f", MAC:"66:60:9e:80:cd:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:45.388415 env[1215]: 2025-05-10 00:36:45.385 [INFO][3591] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646" Namespace="calico-system" Pod="csi-node-driver-2b67p" WorkloadEndpoint="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:36:45.395000 audit[3706]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:45.395000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffcb8b994a0 a2=0 a3=7ffcb8b9948c items=0 ppid=3185 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:45.403452 systemd[1]: Started cri-containerd-054586f317ee600cfc85b304839d24560e3588130b4ebe565e092da2b84430f2.scope. May 10 00:36:45.414767 env[1215]: time="2025-05-10T00:36:45.405743767Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:45.414767 env[1215]: time="2025-05-10T00:36:45.405800394Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:45.414767 env[1215]: time="2025-05-10T00:36:45.405815061Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:45.414767 env[1215]: time="2025-05-10T00:36:45.406161302Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646 pid=3721 runtime=io.containerd.runc.v2 May 10 00:36:45.426181 systemd[1]: Started cri-containerd-efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646.scope. May 10 00:36:45.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.428000 audit: BPF prog-id=169 op=LOAD May 10 00:36:45.428000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.428000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3647 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343538366633313765653630306366633835623330343833396432 May 10 00:36:45.428000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.428000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3647 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343538366633313765653630306366633835623330343833396432 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit: BPF prog-id=170 op=LOAD May 10 00:36:45.429000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261d40 items=0 ppid=3647 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343538366633313765653630306366633835623330343833396432 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit: BPF prog-id=171 op=LOAD May 10 00:36:45.429000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261d88 items=0 ppid=3647 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343538366633313765653630306366633835623330343833396432 May 10 00:36:45.429000 audit: BPF prog-id=171 op=UNLOAD May 10 00:36:45.429000 audit: BPF prog-id=170 op=UNLOAD May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.429000 audit: BPF prog-id=172 op=LOAD May 10 00:36:45.429000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ae198 items=0 ppid=3647 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343538366633313765653630306366633835623330343833396432 May 10 00:36:45.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit: BPF prog-id=173 op=LOAD May 10 00:36:45.438000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.438000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3721 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566636163336633316263646330373566323030333637643131313734 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3721 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566636163336633316263646330373566323030333637643131313734 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.439000 audit: BPF prog-id=174 op=LOAD May 10 00:36:45.439000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000332b90 items=0 ppid=3721 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566636163336633316263646330373566323030333637643131313734 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit: BPF prog-id=175 op=LOAD May 10 00:36:45.440000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000332bd8 items=0 ppid=3721 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566636163336633316263646330373566323030333637643131313734 May 10 00:36:45.440000 audit: BPF prog-id=175 op=UNLOAD May 10 00:36:45.440000 audit: BPF prog-id=174 op=UNLOAD May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:45.440000 audit: BPF prog-id=176 op=LOAD May 10 00:36:45.440000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000332fe8 items=0 ppid=3721 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:45.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566636163336633316263646330373566323030333637643131313734 May 10 00:36:45.443116 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:36:45.447592 env[1215]: time="2025-05-10T00:36:45.447560979Z" level=info msg="StartContainer for \"054586f317ee600cfc85b304839d24560e3588130b4ebe565e092da2b84430f2\" returns successfully" May 10 00:36:45.456597 env[1215]: time="2025-05-10T00:36:45.456552729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2b67p,Uid:27d06b5b-7b04-4f47-8e55-36ac8c0c3647,Namespace:calico-system,Attempt:1,} returns sandbox id \"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646\"" May 10 00:36:45.473920 systemd-networkd[1040]: caliada4b791597: Gained IPv6LL May 10 00:36:45.585000 audit[3733]: AVC avc: denied { getattr } for pid=3733 comm="coredns" path="cgroup:[4026532581]" dev="nsfs" ino=4026532581 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c305 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:36:45.585000 audit[3733]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a948 a2=c0001ae378 a3=0 items=0 ppid=3647 pid=3733 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c305 key=(null) May 10 00:36:45.585000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:36:46.049204 env[1215]: time="2025-05-10T00:36:46.049151170Z" level=info msg="StopPodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\"" May 10 00:36:46.049894 env[1215]: time="2025-05-10T00:36:46.049378748Z" level=info msg="StopPodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\"" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.102 [INFO][3816] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.102 [INFO][3816] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" iface="eth0" netns="/var/run/netns/cni-4feff3e2-9e12-0e64-59cc-73147c168ca9" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.103 [INFO][3816] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" iface="eth0" netns="/var/run/netns/cni-4feff3e2-9e12-0e64-59cc-73147c168ca9" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.103 [INFO][3816] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" iface="eth0" netns="/var/run/netns/cni-4feff3e2-9e12-0e64-59cc-73147c168ca9" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.103 [INFO][3816] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.103 [INFO][3816] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.131 [INFO][3833] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.131 [INFO][3833] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.131 [INFO][3833] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.137 [WARNING][3833] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.137 [INFO][3833] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.138 [INFO][3833] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:46.142064 env[1215]: 2025-05-10 00:36:46.140 [INFO][3816] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:36:46.142884 env[1215]: time="2025-05-10T00:36:46.142238764Z" level=info msg="TearDown network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" successfully" May 10 00:36:46.142884 env[1215]: time="2025-05-10T00:36:46.142273990Z" level=info msg="StopPodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" returns successfully" May 10 00:36:46.142998 env[1215]: time="2025-05-10T00:36:46.142964849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-8jkqt,Uid:112fda21-21dd-48b3-8c0d-f5a5ae17309e,Namespace:calico-apiserver,Attempt:1,}" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.098 [INFO][3811] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.099 [INFO][3811] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" iface="eth0" netns="/var/run/netns/cni-41df6d4b-959a-d7d1-102e-7fb8fb5da417" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.099 [INFO][3811] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" iface="eth0" netns="/var/run/netns/cni-41df6d4b-959a-d7d1-102e-7fb8fb5da417" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.099 [INFO][3811] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" iface="eth0" netns="/var/run/netns/cni-41df6d4b-959a-d7d1-102e-7fb8fb5da417" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.099 [INFO][3811] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.099 [INFO][3811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.134 [INFO][3826] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.134 [INFO][3826] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.138 [INFO][3826] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.145 [WARNING][3826] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.145 [INFO][3826] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.146 [INFO][3826] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:46.150348 env[1215]: 2025-05-10 00:36:46.148 [INFO][3811] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:36:46.150916 env[1215]: time="2025-05-10T00:36:46.150498365Z" level=info msg="TearDown network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" successfully" May 10 00:36:46.150916 env[1215]: time="2025-05-10T00:36:46.150532649Z" level=info msg="StopPodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" returns successfully" May 10 00:36:46.150985 kubelet[1961]: E0510 00:36:46.150852 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:46.151460 env[1215]: time="2025-05-10T00:36:46.151408326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hc94l,Uid:39a293e5-816d-4109-845c-1f22b79176b1,Namespace:kube-system,Attempt:1,}" May 10 00:36:46.178756 kubelet[1961]: E0510 00:36:46.177905 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:46.184472 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3075177270.mount: Deactivated successfully. May 10 00:36:46.184579 systemd[1]: run-netns-cni\x2d4feff3e2\x2d9e12\x2d0e64\x2d59cc\x2d73147c168ca9.mount: Deactivated successfully. May 10 00:36:46.184659 systemd[1]: run-netns-cni\x2d41df6d4b\x2d959a\x2dd7d1\x2d102e\x2d7fb8fb5da417.mount: Deactivated successfully. May 10 00:36:46.205758 kubelet[1961]: I0510 00:36:46.205442 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-9gkns" podStartSLOduration=33.205423111 podStartE2EDuration="33.205423111s" podCreationTimestamp="2025-05-10 00:36:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:36:46.194172476 +0000 UTC m=+38.261919715" watchObservedRunningTime="2025-05-10 00:36:46.205423111 +0000 UTC m=+38.273170319" May 10 00:36:46.222000 audit[3859]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.222000 audit[3859]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffed6f072b0 a2=0 a3=7ffed6f0729c items=0 ppid=2147 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.230000 audit[3859]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.230000 audit[3859]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffed6f072b0 a2=0 a3=0 items=0 ppid=2147 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.257000 audit[3877]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.257000 audit[3877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd1de75100 a2=0 a3=7ffd1de750ec items=0 ppid=2147 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.261000 audit[3877]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:46.261000 audit[3877]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd1de75100 a2=0 a3=7ffd1de750ec items=0 ppid=2147 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:46.321832 systemd-networkd[1040]: cali10a44a919b0: Link UP May 10 00:36:46.326319 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:36:46.326380 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali10a44a919b0: link becomes ready May 10 00:36:46.328396 systemd-networkd[1040]: cali10a44a919b0: Gained carrier May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.238 [INFO][3842] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0 calico-apiserver-7c78d4657- calico-apiserver 112fda21-21dd-48b3-8c0d-f5a5ae17309e 895 0 2025-05-10 00:36:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c78d4657 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7c78d4657-8jkqt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali10a44a919b0 [] []}} ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.238 [INFO][3842] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.281 [INFO][3871] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" HandleID="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.291 [INFO][3871] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" HandleID="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000273300), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7c78d4657-8jkqt", "timestamp":"2025-05-10 00:36:46.28126637 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.291 [INFO][3871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.291 [INFO][3871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.291 [INFO][3871] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.294 [INFO][3871] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.298 [INFO][3871] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.302 [INFO][3871] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.303 [INFO][3871] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.305 [INFO][3871] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.305 [INFO][3871] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.306 [INFO][3871] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.311 [INFO][3871] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.317 [INFO][3871] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.317 [INFO][3871] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" host="localhost" May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.317 [INFO][3871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:46.342835 env[1215]: 2025-05-10 00:36:46.317 [INFO][3871] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" HandleID="k8s-pod-network.24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.343464 env[1215]: 2025-05-10 00:36:46.319 [INFO][3842] cni-plugin/k8s.go 386: Populated endpoint ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"112fda21-21dd-48b3-8c0d-f5a5ae17309e", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7c78d4657-8jkqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali10a44a919b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:46.343464 env[1215]: 2025-05-10 00:36:46.320 [INFO][3842] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.343464 env[1215]: 2025-05-10 00:36:46.320 [INFO][3842] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali10a44a919b0 ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.343464 env[1215]: 2025-05-10 00:36:46.326 [INFO][3842] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.343464 env[1215]: 2025-05-10 00:36:46.326 [INFO][3842] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"112fda21-21dd-48b3-8c0d-f5a5ae17309e", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed", Pod:"calico-apiserver-7c78d4657-8jkqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali10a44a919b0", MAC:"7a:bf:29:27:2d:9e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:46.343464 env[1215]: 2025-05-10 00:36:46.340 [INFO][3842] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed" Namespace="calico-apiserver" Pod="calico-apiserver-7c78d4657-8jkqt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:36:46.353000 audit[3905]: NETFILTER_CFG table=filter:108 family=2 entries=48 op=nft_register_chain pid=3905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:46.353000 audit[3905]: SYSCALL arch=c000003e syscall=46 success=yes exit=25556 a0=3 a1=7fff843c1120 a2=0 a3=7fff843c110c items=0 ppid=3185 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.353000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:46.357661 env[1215]: time="2025-05-10T00:36:46.357587909Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:46.357661 env[1215]: time="2025-05-10T00:36:46.357635389Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:46.357814 env[1215]: time="2025-05-10T00:36:46.357645347Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:46.358092 env[1215]: time="2025-05-10T00:36:46.358054086Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed pid=3913 runtime=io.containerd.runc.v2 May 10 00:36:46.372613 systemd[1]: Started cri-containerd-24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed.scope. May 10 00:36:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.393000 audit: BPF prog-id=177 op=LOAD May 10 00:36:46.395000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3913 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633335393736643466396463383665313834613463346265623836 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3913 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633335393736643466396463383665313834613463346265623836 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.395000 audit: BPF prog-id=178 op=LOAD May 10 00:36:46.395000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000222b70 items=0 ppid=3913 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633335393736643466396463383665313834613463346265623836 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.396000 audit: BPF prog-id=179 op=LOAD May 10 00:36:46.396000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000222bb8 items=0 ppid=3913 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633335393736643466396463383665313834613463346265623836 May 10 00:36:46.397000 audit: BPF prog-id=179 op=UNLOAD May 10 00:36:46.397000 audit: BPF prog-id=178 op=UNLOAD May 10 00:36:46.397000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.397000 audit: BPF prog-id=180 op=LOAD May 10 00:36:46.397000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000222fc8 items=0 ppid=3913 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633335393736643466396463383665313834613463346265623836 May 10 00:36:46.400500 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:36:46.434129 systemd-networkd[1040]: cali2a01a2cbb7f: Link UP May 10 00:36:46.436553 systemd-networkd[1040]: cali2a01a2cbb7f: Gained carrier May 10 00:36:46.436747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a01a2cbb7f: link becomes ready May 10 00:36:46.439041 env[1215]: time="2025-05-10T00:36:46.438938665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c78d4657-8jkqt,Uid:112fda21-21dd-48b3-8c0d-f5a5ae17309e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed\"" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.255 [INFO][3853] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--hc94l-eth0 coredns-668d6bf9bc- kube-system 39a293e5-816d-4109-845c-1f22b79176b1 894 0 2025-05-10 00:36:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-hc94l eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2a01a2cbb7f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.255 [INFO][3853] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.290 [INFO][3880] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" HandleID="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.299 [INFO][3880] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" HandleID="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003096a0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-hc94l", "timestamp":"2025-05-10 00:36:46.29066319 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.299 [INFO][3880] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.318 [INFO][3880] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.319 [INFO][3880] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.396 [INFO][3880] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.402 [INFO][3880] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.407 [INFO][3880] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.409 [INFO][3880] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.412 [INFO][3880] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.412 [INFO][3880] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.413 [INFO][3880] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680 May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.417 [INFO][3880] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.427 [INFO][3880] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.427 [INFO][3880] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" host="localhost" May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.427 [INFO][3880] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:46.455428 env[1215]: 2025-05-10 00:36:46.427 [INFO][3880] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" HandleID="k8s-pod-network.a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.456274 env[1215]: 2025-05-10 00:36:46.430 [INFO][3853] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--hc94l-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"39a293e5-816d-4109-845c-1f22b79176b1", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-hc94l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a01a2cbb7f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:46.456274 env[1215]: 2025-05-10 00:36:46.430 [INFO][3853] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.456274 env[1215]: 2025-05-10 00:36:46.430 [INFO][3853] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2a01a2cbb7f ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.456274 env[1215]: 2025-05-10 00:36:46.437 [INFO][3853] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.456274 env[1215]: 2025-05-10 00:36:46.437 [INFO][3853] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--hc94l-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"39a293e5-816d-4109-845c-1f22b79176b1", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680", Pod:"coredns-668d6bf9bc-hc94l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a01a2cbb7f", MAC:"32:03:cf:c9:13:e2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:46.456274 env[1215]: 2025-05-10 00:36:46.452 [INFO][3853] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680" Namespace="kube-system" Pod="coredns-668d6bf9bc-hc94l" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:36:46.465000 audit[3960]: NETFILTER_CFG table=filter:109 family=2 entries=38 op=nft_register_chain pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:46.465000 audit[3960]: SYSCALL arch=c000003e syscall=46 success=yes exit=19392 a0=3 a1=7ffc965732b0 a2=0 a3=7ffc9657329c items=0 ppid=3185 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.465000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:46.518213 env[1215]: time="2025-05-10T00:36:46.518132193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:46.518213 env[1215]: time="2025-05-10T00:36:46.518168872Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:46.518213 env[1215]: time="2025-05-10T00:36:46.518178721Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:46.518470 env[1215]: time="2025-05-10T00:36:46.518338822Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680 pid=3968 runtime=io.containerd.runc.v2 May 10 00:36:46.530990 systemd[1]: Started cri-containerd-a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680.scope. May 10 00:36:46.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.543000 audit: BPF prog-id=181 op=LOAD May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306263313030356131333131373034666231333834376339666466 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306263313030356131333131373034666231333834376339666466 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit: BPF prog-id=182 op=LOAD May 10 00:36:46.544000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000220830 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306263313030356131333131373034666231333834376339666466 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit: BPF prog-id=183 op=LOAD May 10 00:36:46.544000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000220878 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306263313030356131333131373034666231333834376339666466 May 10 00:36:46.544000 audit: BPF prog-id=183 op=UNLOAD May 10 00:36:46.544000 audit: BPF prog-id=182 op=UNLOAD May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.544000 audit: BPF prog-id=184 op=LOAD May 10 00:36:46.544000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000220c88 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306263313030356131333131373034666231333834376339666466 May 10 00:36:46.547504 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:36:46.577784 env[1215]: time="2025-05-10T00:36:46.575354820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hc94l,Uid:39a293e5-816d-4109-845c-1f22b79176b1,Namespace:kube-system,Attempt:1,} returns sandbox id \"a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680\"" May 10 00:36:46.577959 kubelet[1961]: E0510 00:36:46.576153 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:46.578221 env[1215]: time="2025-05-10T00:36:46.577982301Z" level=info msg="CreateContainer within sandbox \"a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:36:46.593961 env[1215]: time="2025-05-10T00:36:46.593888770Z" level=info msg="CreateContainer within sandbox \"a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0068b6c07d3e3bd2417a1d2ef815b4998b63d0395cb13b7c9875ef9d2a5f133e\"" May 10 00:36:46.594938 env[1215]: time="2025-05-10T00:36:46.594859535Z" level=info msg="StartContainer for \"0068b6c07d3e3bd2417a1d2ef815b4998b63d0395cb13b7c9875ef9d2a5f133e\"" May 10 00:36:46.612658 systemd[1]: Started cri-containerd-0068b6c07d3e3bd2417a1d2ef815b4998b63d0395cb13b7c9875ef9d2a5f133e.scope. May 10 00:36:46.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit: BPF prog-id=185 op=LOAD May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3968 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363862366330376433653362643234313761316432656638313562 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3968 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363862366330376433653362643234313761316432656638313562 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit: BPF prog-id=186 op=LOAD May 10 00:36:46.634000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ffa60 items=0 ppid=3968 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363862366330376433653362643234313761316432656638313562 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.634000 audit: BPF prog-id=187 op=LOAD May 10 00:36:46.634000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ffaa8 items=0 ppid=3968 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363862366330376433653362643234313761316432656638313562 May 10 00:36:46.635000 audit: BPF prog-id=187 op=UNLOAD May 10 00:36:46.635000 audit: BPF prog-id=186 op=UNLOAD May 10 00:36:46.635000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:46.635000 audit: BPF prog-id=188 op=LOAD May 10 00:36:46.635000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ffeb8 items=0 ppid=3968 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363862366330376433653362643234313761316432656638313562 May 10 00:36:46.667544 env[1215]: time="2025-05-10T00:36:46.667467291Z" level=info msg="StartContainer for \"0068b6c07d3e3bd2417a1d2ef815b4998b63d0395cb13b7c9875ef9d2a5f133e\" returns successfully" May 10 00:36:46.667000 audit[4020]: AVC avc: denied { getattr } for pid=4020 comm="coredns" path="cgroup:[4026532600]" dev="nsfs" ino=4026532600 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c812 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:36:46.667000 audit[4020]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0004c0a08 a2=c00049fe48 a3=0 items=0 ppid=3968 pid=4020 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c812 key=(null) May 10 00:36:46.667000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:36:46.688831 systemd-networkd[1040]: cali1180944647d: Gained IPv6LL May 10 00:36:46.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.17:22-10.0.0.1:55010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:46.901453 systemd[1]: Started sshd@9-10.0.0.17:22-10.0.0.1:55010.service. May 10 00:36:46.902579 kernel: kauditd_printk_skb: 948 callbacks suppressed May 10 00:36:46.902708 kernel: audit: type=1130 audit(1746837406.900:1264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.17:22-10.0.0.1:55010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:46.948000 audit[4044]: USER_ACCT pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.949500 sshd[4044]: Accepted publickey for core from 10.0.0.1 port 55010 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:46.952000 audit[4044]: CRED_ACQ pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.954169 sshd[4044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:46.957347 kernel: audit: type=1101 audit(1746837406.948:1265): pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.957414 kernel: audit: type=1103 audit(1746837406.952:1266): pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.957436 kernel: audit: type=1006 audit(1746837406.952:1267): pid=4044 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:36:46.952000 audit[4044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea6e16250 a2=3 a3=0 items=0 ppid=1 pid=4044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.960131 systemd[1]: Started session-10.scope. May 10 00:36:46.960670 systemd-logind[1205]: New session 10 of user core. May 10 00:36:46.963508 kernel: audit: type=1300 audit(1746837406.952:1267): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea6e16250 a2=3 a3=0 items=0 ppid=1 pid=4044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:46.963563 kernel: audit: type=1327 audit(1746837406.952:1267): proctitle=737368643A20636F7265205B707269765D May 10 00:36:46.952000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:46.965000 audit[4044]: USER_START pid=4044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.967000 audit[4046]: CRED_ACQ pid=4046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.974675 kernel: audit: type=1105 audit(1746837406.965:1268): pid=4044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:46.974767 kernel: audit: type=1103 audit(1746837406.967:1269): pid=4046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:47.047714 env[1215]: time="2025-05-10T00:36:47.047329460Z" level=info msg="StopPodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\"" May 10 00:36:47.075843 systemd-networkd[1040]: calic756f10535f: Gained IPv6LL May 10 00:36:47.158772 sshd[4044]: pam_unix(sshd:session): session closed for user core May 10 00:36:47.159000 audit[4044]: USER_END pid=4044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:47.162034 systemd[1]: sshd@9-10.0.0.17:22-10.0.0.1:55010.service: Deactivated successfully. May 10 00:36:47.162931 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:36:47.159000 audit[4044]: CRED_DISP pid=4044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:47.170432 kernel: audit: type=1106 audit(1746837407.159:1270): pid=4044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:47.170528 kernel: audit: type=1104 audit(1746837407.159:1271): pid=4044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:47.171045 systemd-logind[1205]: Session 10 logged out. Waiting for processes to exit. May 10 00:36:47.172789 systemd-logind[1205]: Removed session 10. May 10 00:36:47.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.17:22-10.0.0.1:55010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:47.182694 kubelet[1961]: E0510 00:36:47.182645 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:47.183957 kubelet[1961]: E0510 00:36:47.183941 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:47.207000 audit[4091]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:47.207000 audit[4091]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff54eb7230 a2=0 a3=7fff54eb721c items=0 ppid=2147 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:47.211433 kubelet[1961]: I0510 00:36:47.211225 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-hc94l" podStartSLOduration=34.211209088 podStartE2EDuration="34.211209088s" podCreationTimestamp="2025-05-10 00:36:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:36:47.198036042 +0000 UTC m=+39.265783270" watchObservedRunningTime="2025-05-10 00:36:47.211209088 +0000 UTC m=+39.278956296" May 10 00:36:47.213000 audit[4091]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:47.213000 audit[4091]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff54eb7230 a2=0 a3=7fff54eb721c items=0 ppid=2147 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.171 [INFO][4073] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.171 [INFO][4073] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" iface="eth0" netns="/var/run/netns/cni-11c50aaf-b9a4-70a8-c8ce-cb4544878c7b" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.171 [INFO][4073] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" iface="eth0" netns="/var/run/netns/cni-11c50aaf-b9a4-70a8-c8ce-cb4544878c7b" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.172 [INFO][4073] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" iface="eth0" netns="/var/run/netns/cni-11c50aaf-b9a4-70a8-c8ce-cb4544878c7b" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.172 [INFO][4073] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.172 [INFO][4073] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.215 [INFO][4084] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.215 [INFO][4084] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.215 [INFO][4084] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.227 [WARNING][4084] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.227 [INFO][4084] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.229 [INFO][4084] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:47.232961 env[1215]: 2025-05-10 00:36:47.231 [INFO][4073] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:36:47.235184 env[1215]: time="2025-05-10T00:36:47.233669965Z" level=info msg="TearDown network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" successfully" May 10 00:36:47.235184 env[1215]: time="2025-05-10T00:36:47.233731912Z" level=info msg="StopPodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" returns successfully" May 10 00:36:47.235184 env[1215]: time="2025-05-10T00:36:47.234326219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58bc994dcc-2mzxg,Uid:a7dabf68-04f9-478a-a255-1446cd585546,Namespace:calico-system,Attempt:1,}" May 10 00:36:47.236641 systemd[1]: run-netns-cni\x2d11c50aaf\x2db9a4\x2d70a8\x2dc8ce\x2dcb4544878c7b.mount: Deactivated successfully. May 10 00:36:47.572301 systemd-networkd[1040]: cali2b9464c4f0c: Link UP May 10 00:36:47.575555 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:36:47.575700 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2b9464c4f0c: link becomes ready May 10 00:36:47.575813 systemd-networkd[1040]: cali2b9464c4f0c: Gained carrier May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.332 [INFO][4093] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0 calico-kube-controllers-58bc994dcc- calico-system a7dabf68-04f9-478a-a255-1446cd585546 924 0 2025-05-10 00:36:19 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:58bc994dcc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-58bc994dcc-2mzxg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali2b9464c4f0c [] []}} ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.333 [INFO][4093] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.375 [INFO][4108] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" HandleID="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.385 [INFO][4108] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" HandleID="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00061a990), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-58bc994dcc-2mzxg", "timestamp":"2025-05-10 00:36:47.375056246 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.386 [INFO][4108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.386 [INFO][4108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.386 [INFO][4108] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.388 [INFO][4108] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.392 [INFO][4108] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.395 [INFO][4108] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.397 [INFO][4108] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.399 [INFO][4108] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.399 [INFO][4108] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.401 [INFO][4108] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.416 [INFO][4108] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.568 [INFO][4108] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.568 [INFO][4108] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" host="localhost" May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.568 [INFO][4108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:36:47.598104 env[1215]: 2025-05-10 00:36:47.568 [INFO][4108] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" HandleID="k8s-pod-network.a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.598798 env[1215]: 2025-05-10 00:36:47.570 [INFO][4093] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0", GenerateName:"calico-kube-controllers-58bc994dcc-", Namespace:"calico-system", SelfLink:"", UID:"a7dabf68-04f9-478a-a255-1446cd585546", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58bc994dcc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-58bc994dcc-2mzxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2b9464c4f0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:47.598798 env[1215]: 2025-05-10 00:36:47.570 [INFO][4093] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.598798 env[1215]: 2025-05-10 00:36:47.570 [INFO][4093] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2b9464c4f0c ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.598798 env[1215]: 2025-05-10 00:36:47.572 [INFO][4093] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.598798 env[1215]: 2025-05-10 00:36:47.573 [INFO][4093] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0", GenerateName:"calico-kube-controllers-58bc994dcc-", Namespace:"calico-system", SelfLink:"", UID:"a7dabf68-04f9-478a-a255-1446cd585546", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58bc994dcc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce", Pod:"calico-kube-controllers-58bc994dcc-2mzxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2b9464c4f0c", MAC:"a2:08:40:e6:5e:b6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:36:47.598798 env[1215]: 2025-05-10 00:36:47.596 [INFO][4093] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce" Namespace="calico-system" Pod="calico-kube-controllers-58bc994dcc-2mzxg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:36:47.607000 audit[4124]: NETFILTER_CFG table=filter:112 family=2 entries=52 op=nft_register_chain pid=4124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:36:47.607000 audit[4124]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffe3a5e7350 a2=0 a3=7ffe3a5e733c items=0 ppid=3185 pid=4124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.607000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:36:47.614346 env[1215]: time="2025-05-10T00:36:47.614316101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:47.616280 env[1215]: time="2025-05-10T00:36:47.616234629Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:47.617924 env[1215]: time="2025-05-10T00:36:47.617899779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:47.618444 env[1215]: time="2025-05-10T00:36:47.618381595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:36:47.618444 env[1215]: time="2025-05-10T00:36:47.618423984Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:36:47.618444 env[1215]: time="2025-05-10T00:36:47.618438221Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:36:47.618644 env[1215]: time="2025-05-10T00:36:47.618613220Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce pid=4135 runtime=io.containerd.runc.v2 May 10 00:36:47.622886 env[1215]: time="2025-05-10T00:36:47.622852309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:47.623323 env[1215]: time="2025-05-10T00:36:47.623298007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:36:47.624910 env[1215]: time="2025-05-10T00:36:47.624894499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:36:47.631950 env[1215]: time="2025-05-10T00:36:47.631914387Z" level=info msg="CreateContainer within sandbox \"766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:36:47.635296 systemd[1]: Started cri-containerd-a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce.scope. May 10 00:36:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.645000 audit: BPF prog-id=189 op=LOAD May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4135 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363034636561363765313330636164383964643735386438373062 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4135 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363034636561363765313330636164383964643735386438373062 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit: BPF prog-id=190 op=LOAD May 10 00:36:47.646000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b0120 items=0 ppid=4135 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363034636561363765313330636164383964643735386438373062 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit: BPF prog-id=191 op=LOAD May 10 00:36:47.646000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b0168 items=0 ppid=4135 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363034636561363765313330636164383964643735386438373062 May 10 00:36:47.646000 audit: BPF prog-id=191 op=UNLOAD May 10 00:36:47.646000 audit: BPF prog-id=190 op=UNLOAD May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.646000 audit: BPF prog-id=192 op=LOAD May 10 00:36:47.646000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0578 items=0 ppid=4135 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363034636561363765313330636164383964643735386438373062 May 10 00:36:47.648478 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:36:47.648939 env[1215]: time="2025-05-10T00:36:47.648830911Z" level=info msg="CreateContainer within sandbox \"766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0359355ad51615727c02c5e7155b46d7dcb2da89e475c765f6db20582feb9858\"" May 10 00:36:47.649677 env[1215]: time="2025-05-10T00:36:47.649647806Z" level=info msg="StartContainer for \"0359355ad51615727c02c5e7155b46d7dcb2da89e475c765f6db20582feb9858\"" May 10 00:36:47.666376 systemd[1]: Started cri-containerd-0359355ad51615727c02c5e7155b46d7dcb2da89e475c765f6db20582feb9858.scope. May 10 00:36:47.680814 env[1215]: time="2025-05-10T00:36:47.680757343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58bc994dcc-2mzxg,Uid:a7dabf68-04f9-478a-a255-1446cd585546,Namespace:calico-system,Attempt:1,} returns sandbox id \"a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce\"" May 10 00:36:47.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.681000 audit: BPF prog-id=193 op=LOAD May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3476 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033353933353561643531363135373237633032633565373135356234 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3476 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033353933353561643531363135373237633032633565373135356234 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit: BPF prog-id=194 op=LOAD May 10 00:36:47.682000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096d80 items=0 ppid=3476 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033353933353561643531363135373237633032633565373135356234 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.682000 audit: BPF prog-id=195 op=LOAD May 10 00:36:47.682000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000096dc8 items=0 ppid=3476 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033353933353561643531363135373237633032633565373135356234 May 10 00:36:47.682000 audit: BPF prog-id=195 op=UNLOAD May 10 00:36:47.683000 audit: BPF prog-id=194 op=UNLOAD May 10 00:36:47.683000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:47.683000 audit: BPF prog-id=196 op=LOAD May 10 00:36:47.683000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000971d8 items=0 ppid=3476 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:47.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033353933353561643531363135373237633032633565373135356234 May 10 00:36:47.712095 env[1215]: time="2025-05-10T00:36:47.712046187Z" level=info msg="StartContainer for \"0359355ad51615727c02c5e7155b46d7dcb2da89e475c765f6db20582feb9858\" returns successfully" May 10 00:36:47.776894 systemd-networkd[1040]: cali2a01a2cbb7f: Gained IPv6LL May 10 00:36:47.969278 systemd-networkd[1040]: cali10a44a919b0: Gained IPv6LL May 10 00:36:48.189320 kubelet[1961]: E0510 00:36:48.189285 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:48.189681 kubelet[1961]: E0510 00:36:48.189390 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:48.236000 audit[4214]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:48.236000 audit[4214]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff87d619d0 a2=0 a3=7fff87d619bc items=0 ppid=2147 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:48.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:48.242331 kubelet[1961]: I0510 00:36:48.242260 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c78d4657-wdbhf" podStartSLOduration=25.570860784 podStartE2EDuration="29.242238189s" podCreationTimestamp="2025-05-10 00:36:19 +0000 UTC" firstStartedPulling="2025-05-10 00:36:43.953336294 +0000 UTC m=+36.021083502" lastFinishedPulling="2025-05-10 00:36:47.624713699 +0000 UTC m=+39.692460907" observedRunningTime="2025-05-10 00:36:48.242171674 +0000 UTC m=+40.309918892" watchObservedRunningTime="2025-05-10 00:36:48.242238189 +0000 UTC m=+40.309985397" May 10 00:36:48.256000 audit[4214]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:48.256000 audit[4214]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff87d619d0 a2=0 a3=7fff87d619bc items=0 ppid=2147 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:48.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:48.800933 systemd-networkd[1040]: cali2b9464c4f0c: Gained IPv6LL May 10 00:36:49.191127 kubelet[1961]: I0510 00:36:49.191060 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:49.191818 kubelet[1961]: E0510 00:36:49.191378 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:36:49.270000 audit[4218]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4218 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:49.270000 audit[4218]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe795ccbc0 a2=0 a3=7ffe795ccbac items=0 ppid=2147 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:49.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:49.277000 audit[4218]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4218 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:49.277000 audit[4218]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe795ccbc0 a2=0 a3=7ffe795ccbac items=0 ppid=2147 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:49.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:49.423000 audit[4180]: AVC avc: denied { watch } for pid=4180 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_36_31.823945437/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c155,c366 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c155,c366 tclass=file permissive=0 May 10 00:36:49.423000 audit[4180]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d91260 a2=fc6 a3=0 items=0 ppid=3476 pid=4180 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c155,c366 key=(null) May 10 00:36:49.423000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:36:50.866810 env[1215]: time="2025-05-10T00:36:50.866739797Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:50.869167 env[1215]: time="2025-05-10T00:36:50.869129737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:50.871059 env[1215]: time="2025-05-10T00:36:50.870999221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:50.872894 env[1215]: time="2025-05-10T00:36:50.872866180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:50.873515 env[1215]: time="2025-05-10T00:36:50.873437413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:36:50.875351 env[1215]: time="2025-05-10T00:36:50.875263324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:36:50.876380 env[1215]: time="2025-05-10T00:36:50.876334347Z" level=info msg="CreateContainer within sandbox \"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:36:50.896933 env[1215]: time="2025-05-10T00:36:50.896865140Z" level=info msg="CreateContainer within sandbox \"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"123e9cc9beb37dadaa6407236d50423bf2120e4f7421606b95a885476eddf1c2\"" May 10 00:36:50.897588 env[1215]: time="2025-05-10T00:36:50.897531692Z" level=info msg="StartContainer for \"123e9cc9beb37dadaa6407236d50423bf2120e4f7421606b95a885476eddf1c2\"" May 10 00:36:50.919296 systemd[1]: Started cri-containerd-123e9cc9beb37dadaa6407236d50423bf2120e4f7421606b95a885476eddf1c2.scope. May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8b8818c9f8 items=0 ppid=3721 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:50.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132336539636339626562333764616461613634303732333664353034 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit: BPF prog-id=197 op=LOAD May 10 00:36:50.934000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022e678 items=0 ppid=3721 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:50.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132336539636339626562333764616461613634303732333664353034 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.934000 audit: BPF prog-id=198 op=LOAD May 10 00:36:50.934000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022e6c8 items=0 ppid=3721 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:50.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132336539636339626562333764616461613634303732333664353034 May 10 00:36:50.935000 audit: BPF prog-id=198 op=UNLOAD May 10 00:36:50.935000 audit: BPF prog-id=197 op=UNLOAD May 10 00:36:50.935000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:50.935000 audit: BPF prog-id=199 op=LOAD May 10 00:36:50.935000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022e758 items=0 ppid=3721 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:50.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132336539636339626562333764616461613634303732333664353034 May 10 00:36:50.949117 env[1215]: time="2025-05-10T00:36:50.949068093Z" level=info msg="StartContainer for \"123e9cc9beb37dadaa6407236d50423bf2120e4f7421606b95a885476eddf1c2\" returns successfully" May 10 00:36:51.341944 env[1215]: time="2025-05-10T00:36:51.341870811Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.344637 env[1215]: time="2025-05-10T00:36:51.344590681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.348194 env[1215]: time="2025-05-10T00:36:51.348131545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.350073 env[1215]: time="2025-05-10T00:36:51.350017358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:51.350586 env[1215]: time="2025-05-10T00:36:51.350558415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:36:51.351765 env[1215]: time="2025-05-10T00:36:51.351729666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:36:51.353003 env[1215]: time="2025-05-10T00:36:51.352971649Z" level=info msg="CreateContainer within sandbox \"24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:36:51.370013 env[1215]: time="2025-05-10T00:36:51.369954371Z" level=info msg="CreateContainer within sandbox \"24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7fac880f8644cd07a2d166bbdd3054246eeef8ff0ed4c9f7c30c9a7c05e44d92\"" May 10 00:36:51.370642 env[1215]: time="2025-05-10T00:36:51.370594153Z" level=info msg="StartContainer for \"7fac880f8644cd07a2d166bbdd3054246eeef8ff0ed4c9f7c30c9a7c05e44d92\"" May 10 00:36:51.388769 systemd[1]: Started cri-containerd-7fac880f8644cd07a2d166bbdd3054246eeef8ff0ed4c9f7c30c9a7c05e44d92.scope. May 10 00:36:51.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit: BPF prog-id=200 op=LOAD May 10 00:36:51.400000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3913 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616338383066383634346364303761326431363662626464333035 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3913 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616338383066383634346364303761326431363662626464333035 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.400000 audit: BPF prog-id=201 op=LOAD May 10 00:36:51.400000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003add40 items=0 ppid=3913 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616338383066383634346364303761326431363662626464333035 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit: BPF prog-id=202 op=LOAD May 10 00:36:51.401000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003add88 items=0 ppid=3913 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616338383066383634346364303761326431363662626464333035 May 10 00:36:51.401000 audit: BPF prog-id=202 op=UNLOAD May 10 00:36:51.401000 audit: BPF prog-id=201 op=UNLOAD May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:51.401000 audit: BPF prog-id=203 op=LOAD May 10 00:36:51.401000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000416198 items=0 ppid=3913 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:51.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616338383066383634346364303761326431363662626464333035 May 10 00:36:51.430550 env[1215]: time="2025-05-10T00:36:51.430477206Z" level=info msg="StartContainer for \"7fac880f8644cd07a2d166bbdd3054246eeef8ff0ed4c9f7c30c9a7c05e44d92\" returns successfully" May 10 00:36:52.015000 audit[4271]: AVC avc: denied { watch } for pid=4271 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_36_31.2603591909/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c500,c634 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c500,c634 tclass=file permissive=0 May 10 00:36:52.021828 kernel: kauditd_printk_skb: 239 callbacks suppressed May 10 00:36:52.021964 kernel: audit: type=1400 audit(1746837412.015:1341): avc: denied { watch } for pid=4271 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_36_31.2603591909/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c500,c634 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c500,c634 tclass=file permissive=0 May 10 00:36:52.022006 kernel: audit: type=1300 audit(1746837412.015:1341): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001205160 a2=fc6 a3=0 items=0 ppid=3913 pid=4271 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c500,c634 key=(null) May 10 00:36:52.015000 audit[4271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001205160 a2=fc6 a3=0 items=0 ppid=3913 pid=4271 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c500,c634 key=(null) May 10 00:36:52.015000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:36:52.034281 kernel: audit: type=1327 audit(1746837412.015:1341): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:36:52.162677 systemd[1]: Started sshd@10-10.0.0.17:22-10.0.0.1:55018.service. May 10 00:36:52.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.17:22-10.0.0.1:55018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:52.169713 kernel: audit: type=1130 audit(1746837412.162:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.17:22-10.0.0.1:55018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:52.226000 audit[4293]: USER_ACCT pid=4293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.227592 sshd[4293]: Accepted publickey for core from 10.0.0.1 port 55018 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:52.245586 sshd[4293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:52.249869 kernel: audit: type=1101 audit(1746837412.226:1343): pid=4293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.249958 kernel: audit: type=1103 audit(1746837412.230:1344): pid=4293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.230000 audit[4293]: CRED_ACQ pid=4293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.250875 systemd[1]: Started session-11.scope. May 10 00:36:52.251314 systemd-logind[1205]: New session 11 of user core. May 10 00:36:52.257122 kernel: audit: type=1006 audit(1746837412.230:1345): pid=4293 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:36:52.257200 kernel: audit: type=1300 audit(1746837412.230:1345): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73a45ee0 a2=3 a3=0 items=0 ppid=1 pid=4293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.230000 audit[4293]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73a45ee0 a2=3 a3=0 items=0 ppid=1 pid=4293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.292275 kernel: audit: type=1327 audit(1746837412.230:1345): proctitle=737368643A20636F7265205B707269765D May 10 00:36:52.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:52.256000 audit[4293]: USER_START pid=4293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.297967 kernel: audit: type=1105 audit(1746837412.256:1346): pid=4293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.257000 audit[4295]: CRED_ACQ pid=4295 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.467358 sshd[4293]: pam_unix(sshd:session): session closed for user core May 10 00:36:52.467000 audit[4293]: USER_END pid=4293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.467000 audit[4293]: CRED_DISP pid=4293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:52.470549 systemd[1]: sshd@10-10.0.0.17:22-10.0.0.1:55018.service: Deactivated successfully. May 10 00:36:52.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.17:22-10.0.0.1:55018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:52.471327 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:36:52.471000 audit[4306]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:52.471000 audit[4306]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeefe9fe40 a2=0 a3=7ffeefe9fe2c items=0 ppid=2147 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:52.471978 systemd-logind[1205]: Session 11 logged out. Waiting for processes to exit. May 10 00:36:52.472969 systemd-logind[1205]: Removed session 11. May 10 00:36:52.475000 audit[4306]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:52.475000 audit[4306]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeefe9fe40 a2=0 a3=7ffeefe9fe2c items=0 ppid=2147 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:52.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:53.201827 kubelet[1961]: I0510 00:36:53.201795 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:55.284340 env[1215]: time="2025-05-10T00:36:55.284267770Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:55.316382 env[1215]: time="2025-05-10T00:36:55.316314754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:55.336675 env[1215]: time="2025-05-10T00:36:55.336631735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:55.358446 env[1215]: time="2025-05-10T00:36:55.358387610Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:55.359061 env[1215]: time="2025-05-10T00:36:55.359028413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:36:55.360030 env[1215]: time="2025-05-10T00:36:55.360000529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:36:55.366102 env[1215]: time="2025-05-10T00:36:55.366067445Z" level=info msg="CreateContainer within sandbox \"a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:36:55.398395 env[1215]: time="2025-05-10T00:36:55.398323080Z" level=info msg="CreateContainer within sandbox \"a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2c63fef9390c4a14e807f9cace420ac136951ed4f6fd746abdbfda199ddbbb61\"" May 10 00:36:55.399391 env[1215]: time="2025-05-10T00:36:55.399333858Z" level=info msg="StartContainer for \"2c63fef9390c4a14e807f9cace420ac136951ed4f6fd746abdbfda199ddbbb61\"" May 10 00:36:55.421321 systemd[1]: Started cri-containerd-2c63fef9390c4a14e807f9cace420ac136951ed4f6fd746abdbfda199ddbbb61.scope. May 10 00:36:55.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.432000 audit: BPF prog-id=204 op=LOAD May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4135 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:55.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363366656639333930633461313465383037663963616365343230 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4135 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:55.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363366656639333930633461313465383037663963616365343230 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit: BPF prog-id=205 op=LOAD May 10 00:36:55.433000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a89a0 items=0 ppid=4135 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:55.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363366656639333930633461313465383037663963616365343230 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit: BPF prog-id=206 op=LOAD May 10 00:36:55.433000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a89e8 items=0 ppid=4135 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:55.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363366656639333930633461313465383037663963616365343230 May 10 00:36:55.433000 audit: BPF prog-id=206 op=UNLOAD May 10 00:36:55.433000 audit: BPF prog-id=205 op=UNLOAD May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:55.433000 audit: BPF prog-id=207 op=LOAD May 10 00:36:55.433000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a8df8 items=0 ppid=4135 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:55.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363366656639333930633461313465383037663963616365343230 May 10 00:36:55.461527 env[1215]: time="2025-05-10T00:36:55.461483994Z" level=info msg="StartContainer for \"2c63fef9390c4a14e807f9cace420ac136951ed4f6fd746abdbfda199ddbbb61\" returns successfully" May 10 00:36:56.259349 kubelet[1961]: I0510 00:36:56.259272 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-58bc994dcc-2mzxg" podStartSLOduration=29.58124956 podStartE2EDuration="37.259253706s" podCreationTimestamp="2025-05-10 00:36:19 +0000 UTC" firstStartedPulling="2025-05-10 00:36:47.681821243 +0000 UTC m=+39.749568441" lastFinishedPulling="2025-05-10 00:36:55.359825379 +0000 UTC m=+47.427572587" observedRunningTime="2025-05-10 00:36:56.25811137 +0000 UTC m=+48.325858578" watchObservedRunningTime="2025-05-10 00:36:56.259253706 +0000 UTC m=+48.327000914" May 10 00:36:56.259860 kubelet[1961]: I0510 00:36:56.259432 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c78d4657-8jkqt" podStartSLOduration=32.349528578 podStartE2EDuration="37.259426099s" podCreationTimestamp="2025-05-10 00:36:19 +0000 UTC" firstStartedPulling="2025-05-10 00:36:46.441648029 +0000 UTC m=+38.509395237" lastFinishedPulling="2025-05-10 00:36:51.351545539 +0000 UTC m=+43.419292758" observedRunningTime="2025-05-10 00:36:52.338063093 +0000 UTC m=+44.405810301" watchObservedRunningTime="2025-05-10 00:36:56.259426099 +0000 UTC m=+48.327173327" May 10 00:36:56.759288 kubelet[1961]: I0510 00:36:56.759232 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:56.787000 audit[4357]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:56.787000 audit[4357]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffcbe29290 a2=0 a3=7fffcbe2927c items=0 ppid=2147 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:56.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:56.793000 audit[4357]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:56.793000 audit[4357]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffcbe29290 a2=0 a3=7fffcbe2927c items=0 ppid=2147 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:56.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:57.215007 kubelet[1961]: I0510 00:36:57.214965 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:57.492259 kernel: kauditd_printk_skb: 73 callbacks suppressed May 10 00:36:57.492411 kernel: audit: type=1130 audit(1746837417.472:1373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.17:22-10.0.0.1:33448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:57.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.17:22-10.0.0.1:33448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:57.473109 systemd[1]: Started sshd@11-10.0.0.17:22-10.0.0.1:33448.service. May 10 00:36:57.531000 audit[4359]: USER_ACCT pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.536000 audit[4359]: CRED_ACQ pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.537346 sshd[4359]: Accepted publickey for core from 10.0.0.1 port 33448 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:57.537633 sshd[4359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:57.537871 kernel: audit: type=1101 audit(1746837417.531:1374): pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.537913 kernel: audit: type=1103 audit(1746837417.536:1375): pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.543710 kernel: audit: type=1006 audit(1746837417.536:1376): pid=4359 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 10 00:36:57.543772 kernel: audit: type=1300 audit(1746837417.536:1376): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39f165c0 a2=3 a3=0 items=0 ppid=1 pid=4359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.536000 audit[4359]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39f165c0 a2=3 a3=0 items=0 ppid=1 pid=4359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.544658 systemd-logind[1205]: New session 12 of user core. May 10 00:36:57.544904 systemd[1]: Started session-12.scope. May 10 00:36:57.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:57.560797 kernel: audit: type=1327 audit(1746837417.536:1376): proctitle=737368643A20636F7265205B707269765D May 10 00:36:57.560843 kernel: audit: type=1105 audit(1746837417.549:1377): pid=4359 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.549000 audit[4359]: USER_START pid=4359 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.550000 audit[4361]: CRED_ACQ pid=4361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.568566 kernel: audit: type=1103 audit(1746837417.550:1378): pid=4361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.666728 env[1215]: time="2025-05-10T00:36:57.666015856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:57.669402 env[1215]: time="2025-05-10T00:36:57.669345068Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:57.671938 env[1215]: time="2025-05-10T00:36:57.671887212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:57.675324 env[1215]: time="2025-05-10T00:36:57.675276547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:36:57.676065 env[1215]: time="2025-05-10T00:36:57.676026976Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:36:57.677963 env[1215]: time="2025-05-10T00:36:57.677930502Z" level=info msg="CreateContainer within sandbox \"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:36:57.709609 env[1215]: time="2025-05-10T00:36:57.709559429Z" level=info msg="CreateContainer within sandbox \"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"880faa8bcd1303af96733095c66ce33696ca804ddefe61d8adb18f8b2b5bb2e6\"" May 10 00:36:57.711349 env[1215]: time="2025-05-10T00:36:57.711321448Z" level=info msg="StartContainer for \"880faa8bcd1303af96733095c66ce33696ca804ddefe61d8adb18f8b2b5bb2e6\"" May 10 00:36:57.734699 systemd[1]: Started cri-containerd-880faa8bcd1303af96733095c66ce33696ca804ddefe61d8adb18f8b2b5bb2e6.scope. May 10 00:36:57.759834 kernel: audit: type=1400 audit(1746837417.751:1379): avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.759960 kernel: audit: type=1300 audit(1746837417.751:1379): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fab5a7d9858 items=0 ppid=3721 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.751000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fab5a7d9858 items=0 ppid=3721 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838306661613862636431333033616639363733333039356336366365 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.751000 audit: BPF prog-id=208 op=LOAD May 10 00:36:57.751000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032dbd8 items=0 ppid=3721 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838306661613862636431333033616639363733333039356336366365 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.754000 audit: BPF prog-id=209 op=LOAD May 10 00:36:57.754000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032dc28 items=0 ppid=3721 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838306661613862636431333033616639363733333039356336366365 May 10 00:36:57.759000 audit: BPF prog-id=209 op=UNLOAD May 10 00:36:57.759000 audit: BPF prog-id=208 op=UNLOAD May 10 00:36:57.760000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:36:57.760000 audit: BPF prog-id=210 op=LOAD May 10 00:36:57.760000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032dcb8 items=0 ppid=3721 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838306661613862636431333033616639363733333039356336366365 May 10 00:36:57.763231 sshd[4359]: pam_unix(sshd:session): session closed for user core May 10 00:36:57.763000 audit[4359]: USER_END pid=4359 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.763000 audit[4359]: CRED_DISP pid=4359 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.766105 systemd[1]: Started sshd@12-10.0.0.17:22-10.0.0.1:33450.service. May 10 00:36:57.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.17:22-10.0.0.1:33450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:57.766891 systemd[1]: sshd@11-10.0.0.17:22-10.0.0.1:33448.service: Deactivated successfully. May 10 00:36:57.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.17:22-10.0.0.1:33448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:57.768199 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:36:57.769074 systemd-logind[1205]: Session 12 logged out. Waiting for processes to exit. May 10 00:36:57.771064 systemd-logind[1205]: Removed session 12. May 10 00:36:57.780465 env[1215]: time="2025-05-10T00:36:57.780420555Z" level=info msg="StartContainer for \"880faa8bcd1303af96733095c66ce33696ca804ddefe61d8adb18f8b2b5bb2e6\" returns successfully" May 10 00:36:57.805000 audit[4400]: USER_ACCT pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.806634 sshd[4400]: Accepted publickey for core from 10.0.0.1 port 33450 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:57.806000 audit[4400]: CRED_ACQ pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.806000 audit[4400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb0631110 a2=3 a3=0 items=0 ppid=1 pid=4400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:57.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:57.807720 sshd[4400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:57.811337 systemd-logind[1205]: New session 13 of user core. May 10 00:36:57.812280 systemd[1]: Started session-13.scope. May 10 00:36:57.815000 audit[4400]: USER_START pid=4400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:57.816000 audit[4417]: CRED_ACQ pid=4417 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.020334 sshd[4400]: pam_unix(sshd:session): session closed for user core May 10 00:36:58.021000 audit[4400]: USER_END pid=4400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.021000 audit[4400]: CRED_DISP pid=4400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.024525 systemd[1]: Started sshd@13-10.0.0.17:22-10.0.0.1:33460.service. May 10 00:36:58.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.17:22-10.0.0.1:33460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:58.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.17:22-10.0.0.1:33450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:58.029012 systemd[1]: sshd@12-10.0.0.17:22-10.0.0.1:33450.service: Deactivated successfully. May 10 00:36:58.029755 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:36:58.030449 systemd-logind[1205]: Session 13 logged out. Waiting for processes to exit. May 10 00:36:58.031322 systemd-logind[1205]: Removed session 13. May 10 00:36:58.064000 audit[4425]: USER_ACCT pid=4425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.066443 sshd[4425]: Accepted publickey for core from 10.0.0.1 port 33460 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:36:58.065000 audit[4425]: CRED_ACQ pid=4425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.065000 audit[4425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe242d1610 a2=3 a3=0 items=0 ppid=1 pid=4425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:58.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:36:58.066860 sshd[4425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:36:58.070640 systemd-logind[1205]: New session 14 of user core. May 10 00:36:58.071604 systemd[1]: Started session-14.scope. May 10 00:36:58.075000 audit[4425]: USER_START pid=4425 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.076000 audit[4428]: CRED_ACQ pid=4428 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.107589 kubelet[1961]: I0510 00:36:58.107556 1961 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:36:58.107589 kubelet[1961]: I0510 00:36:58.107585 1961 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:36:58.210092 sshd[4425]: pam_unix(sshd:session): session closed for user core May 10 00:36:58.210000 audit[4425]: USER_END pid=4425 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.210000 audit[4425]: CRED_DISP pid=4425 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:36:58.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.17:22-10.0.0.1:33460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:36:58.212302 systemd[1]: sshd@13-10.0.0.17:22-10.0.0.1:33460.service: Deactivated successfully. May 10 00:36:58.212998 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:36:58.213761 systemd-logind[1205]: Session 14 logged out. Waiting for processes to exit. May 10 00:36:58.214485 systemd-logind[1205]: Removed session 14. May 10 00:36:59.283863 kubelet[1961]: I0510 00:36:59.283625 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:36:59.303878 kubelet[1961]: I0510 00:36:59.303788 1961 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2b67p" podStartSLOduration=28.08484726 podStartE2EDuration="40.303761191s" podCreationTimestamp="2025-05-10 00:36:19 +0000 UTC" firstStartedPulling="2025-05-10 00:36:45.457858305 +0000 UTC m=+37.525605513" lastFinishedPulling="2025-05-10 00:36:57.676772236 +0000 UTC m=+49.744519444" observedRunningTime="2025-05-10 00:36:58.23541411 +0000 UTC m=+50.303161328" watchObservedRunningTime="2025-05-10 00:36:59.303761191 +0000 UTC m=+51.371508409" May 10 00:36:59.314000 audit[4441]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:59.314000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd8b7c3fc0 a2=0 a3=7ffd8b7c3fac items=0 ppid=2147 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:59.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:36:59.326000 audit[4441]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:36:59.326000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd8b7c3fc0 a2=0 a3=7ffd8b7c3fac items=0 ppid=2147 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:36:59.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:01.183776 kubelet[1961]: I0510 00:37:01.183731 1961 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:37:01.249463 systemd[1]: run-containerd-runc-k8s.io-2c63fef9390c4a14e807f9cace420ac136951ed4f6fd746abdbfda199ddbbb61-runc.c7nEJu.mount: Deactivated successfully. May 10 00:37:03.214784 systemd[1]: Started sshd@14-10.0.0.17:22-10.0.0.1:33462.service. May 10 00:37:03.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.17:22-10.0.0.1:33462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:03.217082 kernel: kauditd_printk_skb: 72 callbacks suppressed May 10 00:37:03.219990 kernel: audit: type=1130 audit(1746837423.214:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.17:22-10.0.0.1:33462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:03.305000 audit[4491]: USER_ACCT pid=4491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.306441 sshd[4491]: Accepted publickey for core from 10.0.0.1 port 33462 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:03.308943 sshd[4491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:03.307000 audit[4491]: CRED_ACQ pid=4491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.313504 systemd-logind[1205]: New session 15 of user core. May 10 00:37:03.314322 systemd[1]: Started session-15.scope. May 10 00:37:03.316939 kernel: audit: type=1101 audit(1746837423.305:1409): pid=4491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.317027 kernel: audit: type=1103 audit(1746837423.307:1410): pid=4491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.317055 kernel: audit: type=1006 audit(1746837423.307:1411): pid=4491 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:37:03.307000 audit[4491]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe528d85c0 a2=3 a3=0 items=0 ppid=1 pid=4491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.324645 kernel: audit: type=1300 audit(1746837423.307:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe528d85c0 a2=3 a3=0 items=0 ppid=1 pid=4491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:03.324741 kernel: audit: type=1327 audit(1746837423.307:1411): proctitle=737368643A20636F7265205B707269765D May 10 00:37:03.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:03.318000 audit[4491]: USER_START pid=4491 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.341932 kernel: audit: type=1105 audit(1746837423.318:1412): pid=4491 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.342087 kernel: audit: type=1103 audit(1746837423.320:1413): pid=4493 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.320000 audit[4493]: CRED_ACQ pid=4493 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.436183 sshd[4491]: pam_unix(sshd:session): session closed for user core May 10 00:37:03.436000 audit[4491]: USER_END pid=4491 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.439187 systemd[1]: sshd@14-10.0.0.17:22-10.0.0.1:33462.service: Deactivated successfully. May 10 00:37:03.439958 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:37:03.440736 systemd-logind[1205]: Session 15 logged out. Waiting for processes to exit. May 10 00:37:03.441672 systemd-logind[1205]: Removed session 15. May 10 00:37:03.436000 audit[4491]: CRED_DISP pid=4491 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.446203 kernel: audit: type=1106 audit(1746837423.436:1414): pid=4491 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.446284 kernel: audit: type=1104 audit(1746837423.436:1415): pid=4491 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:03.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.17:22-10.0.0.1:33462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:05.461000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.461000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a911d0 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:37:05.461000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.461000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bc9680 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:37:05.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:37:05.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:37:05.543000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.543000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.543000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.543000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00c79f410 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:37:05.543000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00e5dfd60 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:37:05.543000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:37:05.543000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:37:05.543000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00d4a9170 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:37:05.543000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:37:05.548000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.548000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00cf76900 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:37:05.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:37:05.570000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.570000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00d63aaa0 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:37:05.570000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:37:05.571000 audit[1834]: AVC avc: denied { watch } for pid=1834 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:05.571000 audit[1834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00cf76c90 a2=fc6 a3=0 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c156 key=(null) May 10 00:37:05.571000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:37:08.038650 env[1215]: time="2025-05-10T00:37:08.038539132Z" level=info msg="StopPodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\"" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.075 [WARNING][4525] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2b67p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27d06b5b-7b04-4f47-8e55-36ac8c0c3647", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646", Pod:"csi-node-driver-2b67p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic756f10535f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.075 [INFO][4525] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.076 [INFO][4525] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" iface="eth0" netns="" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.076 [INFO][4525] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.076 [INFO][4525] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.099 [INFO][4535] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.099 [INFO][4535] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.099 [INFO][4535] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.105 [WARNING][4535] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.105 [INFO][4535] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.107 [INFO][4535] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.110496 env[1215]: 2025-05-10 00:37:08.108 [INFO][4525] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.112887 env[1215]: time="2025-05-10T00:37:08.110524987Z" level=info msg="TearDown network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" successfully" May 10 00:37:08.112887 env[1215]: time="2025-05-10T00:37:08.110557107Z" level=info msg="StopPodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" returns successfully" May 10 00:37:08.112887 env[1215]: time="2025-05-10T00:37:08.111173164Z" level=info msg="RemovePodSandbox for \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\"" May 10 00:37:08.112887 env[1215]: time="2025-05-10T00:37:08.111204823Z" level=info msg="Forcibly stopping sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\"" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.154 [WARNING][4557] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2b67p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27d06b5b-7b04-4f47-8e55-36ac8c0c3647", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"efcac3f31bcdc075f200367d111745f906f3d4b875e78b75918b70c887595646", Pod:"csi-node-driver-2b67p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic756f10535f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.154 [INFO][4557] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.154 [INFO][4557] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" iface="eth0" netns="" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.154 [INFO][4557] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.154 [INFO][4557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.191 [INFO][4566] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.191 [INFO][4566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.191 [INFO][4566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.198 [WARNING][4566] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.198 [INFO][4566] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" HandleID="k8s-pod-network.7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" Workload="localhost-k8s-csi--node--driver--2b67p-eth0" May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.199 [INFO][4566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.202505 env[1215]: 2025-05-10 00:37:08.201 [INFO][4557] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd" May 10 00:37:08.203214 env[1215]: time="2025-05-10T00:37:08.202539042Z" level=info msg="TearDown network for sandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" successfully" May 10 00:37:08.454144 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:37:08.454266 kernel: audit: type=1130 audit(1746837428.441:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.17:22-10.0.0.1:57612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:08.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.17:22-10.0.0.1:57612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:08.442269 systemd[1]: Started sshd@15-10.0.0.17:22-10.0.0.1:57612.service. May 10 00:37:08.497000 audit[4576]: USER_ACCT pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.498369 sshd[4576]: Accepted publickey for core from 10.0.0.1 port 57612 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:08.501602 sshd[4576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:08.500000 audit[4576]: CRED_ACQ pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.505273 systemd-logind[1205]: New session 16 of user core. May 10 00:37:08.506082 systemd[1]: Started session-16.scope. May 10 00:37:08.520252 kernel: audit: type=1101 audit(1746837428.497:1426): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.520357 kernel: audit: type=1103 audit(1746837428.500:1427): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.520385 kernel: audit: type=1006 audit(1746837428.500:1428): pid=4576 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:37:08.500000 audit[4576]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc9ca110 a2=3 a3=0 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:08.528017 kernel: audit: type=1300 audit(1746837428.500:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc9ca110 a2=3 a3=0 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:08.528066 kernel: audit: type=1327 audit(1746837428.500:1428): proctitle=737368643A20636F7265205B707269765D May 10 00:37:08.500000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:08.509000 audit[4576]: USER_START pid=4576 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.534637 kernel: audit: type=1105 audit(1746837428.509:1429): pid=4576 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.534679 kernel: audit: type=1103 audit(1746837428.511:1430): pid=4578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.511000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.543231 env[1215]: time="2025-05-10T00:37:08.543156863Z" level=info msg="RemovePodSandbox \"7041c6de826a5d1149f937e4b6b7a7b34a0a4fef10e95a1e0737ce1a4be5c6fd\" returns successfully" May 10 00:37:08.543863 env[1215]: time="2025-05-10T00:37:08.543827331Z" level=info msg="StopPodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\"" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.580 [WARNING][4594] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3eee2db-8034-4bf4-8367-fbe10e8f2c14", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69", Pod:"calico-apiserver-7c78d4657-wdbhf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliada4b791597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.580 [INFO][4594] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.580 [INFO][4594] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" iface="eth0" netns="" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.581 [INFO][4594] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.581 [INFO][4594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.602 [INFO][4606] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.603 [INFO][4606] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.603 [INFO][4606] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.610 [WARNING][4606] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.610 [INFO][4606] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.612 [INFO][4606] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.617079 env[1215]: 2025-05-10 00:37:08.614 [INFO][4594] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.617565 env[1215]: time="2025-05-10T00:37:08.617082047Z" level=info msg="TearDown network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" successfully" May 10 00:37:08.617565 env[1215]: time="2025-05-10T00:37:08.617121932Z" level=info msg="StopPodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" returns successfully" May 10 00:37:08.617756 env[1215]: time="2025-05-10T00:37:08.617662727Z" level=info msg="RemovePodSandbox for \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\"" May 10 00:37:08.618056 env[1215]: time="2025-05-10T00:37:08.618001192Z" level=info msg="Forcibly stopping sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\"" May 10 00:37:08.678530 sshd[4576]: pam_unix(sshd:session): session closed for user core May 10 00:37:08.679000 audit[4576]: USER_END pid=4576 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.681535 systemd[1]: sshd@15-10.0.0.17:22-10.0.0.1:57612.service: Deactivated successfully. May 10 00:37:08.682269 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:37:08.683358 systemd-logind[1205]: Session 16 logged out. Waiting for processes to exit. May 10 00:37:08.684297 systemd-logind[1205]: Removed session 16. May 10 00:37:08.679000 audit[4576]: CRED_DISP pid=4576 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.688258 kernel: audit: type=1106 audit(1746837428.679:1431): pid=4576 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.688404 kernel: audit: type=1104 audit(1746837428.679:1432): pid=4576 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:08.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.17:22-10.0.0.1:57612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.660 [WARNING][4635] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3eee2db-8034-4bf4-8367-fbe10e8f2c14", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"766044f85e6a8b02510d25e9ae6c48601b388a8d14ca4637f522098ac3343a69", Pod:"calico-apiserver-7c78d4657-wdbhf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliada4b791597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.660 [INFO][4635] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.660 [INFO][4635] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" iface="eth0" netns="" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.660 [INFO][4635] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.660 [INFO][4635] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.684 [INFO][4643] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.684 [INFO][4643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.685 [INFO][4643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.692 [WARNING][4643] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.692 [INFO][4643] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" HandleID="k8s-pod-network.3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" Workload="localhost-k8s-calico--apiserver--7c78d4657--wdbhf-eth0" May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.694 [INFO][4643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.698298 env[1215]: 2025-05-10 00:37:08.696 [INFO][4635] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b" May 10 00:37:08.698991 env[1215]: time="2025-05-10T00:37:08.698323433Z" level=info msg="TearDown network for sandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" successfully" May 10 00:37:08.702533 env[1215]: time="2025-05-10T00:37:08.702495895Z" level=info msg="RemovePodSandbox \"3e58c065025bc3793919184d228152eb58b89afcf96c809a6b3302deeee9bf3b\" returns successfully" May 10 00:37:08.703142 env[1215]: time="2025-05-10T00:37:08.703077746Z" level=info msg="StopPodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\"" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.741 [WARNING][4667] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0", GenerateName:"calico-kube-controllers-58bc994dcc-", Namespace:"calico-system", SelfLink:"", UID:"a7dabf68-04f9-478a-a255-1446cd585546", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58bc994dcc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce", Pod:"calico-kube-controllers-58bc994dcc-2mzxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2b9464c4f0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.741 [INFO][4667] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.741 [INFO][4667] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" iface="eth0" netns="" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.741 [INFO][4667] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.741 [INFO][4667] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.761 [INFO][4675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.761 [INFO][4675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.761 [INFO][4675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.767 [WARNING][4675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.767 [INFO][4675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.769 [INFO][4675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.772506 env[1215]: 2025-05-10 00:37:08.771 [INFO][4667] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.772506 env[1215]: time="2025-05-10T00:37:08.772478560Z" level=info msg="TearDown network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" successfully" May 10 00:37:08.773203 env[1215]: time="2025-05-10T00:37:08.772514708Z" level=info msg="StopPodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" returns successfully" May 10 00:37:08.773238 env[1215]: time="2025-05-10T00:37:08.773185466Z" level=info msg="RemovePodSandbox for \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\"" May 10 00:37:08.773267 env[1215]: time="2025-05-10T00:37:08.773226553Z" level=info msg="Forcibly stopping sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\"" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.805 [WARNING][4697] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0", GenerateName:"calico-kube-controllers-58bc994dcc-", Namespace:"calico-system", SelfLink:"", UID:"a7dabf68-04f9-478a-a255-1446cd585546", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58bc994dcc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a4604cea67e130cad89dd758d870b77bbfaccce19bff4139ccf833d17cec13ce", Pod:"calico-kube-controllers-58bc994dcc-2mzxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2b9464c4f0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.806 [INFO][4697] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.806 [INFO][4697] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" iface="eth0" netns="" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.806 [INFO][4697] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.806 [INFO][4697] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.823 [INFO][4705] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.823 [INFO][4705] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.823 [INFO][4705] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.829 [WARNING][4705] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.829 [INFO][4705] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" HandleID="k8s-pod-network.cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" Workload="localhost-k8s-calico--kube--controllers--58bc994dcc--2mzxg-eth0" May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.831 [INFO][4705] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.838514 env[1215]: 2025-05-10 00:37:08.837 [INFO][4697] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee" May 10 00:37:08.839104 env[1215]: time="2025-05-10T00:37:08.838551076Z" level=info msg="TearDown network for sandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" successfully" May 10 00:37:08.842625 env[1215]: time="2025-05-10T00:37:08.842569038Z" level=info msg="RemovePodSandbox \"cf756bc4711ebeac68a614776d341d15775b360482446dad70dc199a30b829ee\" returns successfully" May 10 00:37:08.843170 env[1215]: time="2025-05-10T00:37:08.843101797Z" level=info msg="StopPodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\"" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.879 [WARNING][4728] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"112fda21-21dd-48b3-8c0d-f5a5ae17309e", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed", Pod:"calico-apiserver-7c78d4657-8jkqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali10a44a919b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.880 [INFO][4728] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.880 [INFO][4728] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" iface="eth0" netns="" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.880 [INFO][4728] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.880 [INFO][4728] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.902 [INFO][4736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.902 [INFO][4736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.902 [INFO][4736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.908 [WARNING][4736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.908 [INFO][4736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.909 [INFO][4736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.912372 env[1215]: 2025-05-10 00:37:08.911 [INFO][4728] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.913042 env[1215]: time="2025-05-10T00:37:08.912408264Z" level=info msg="TearDown network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" successfully" May 10 00:37:08.913042 env[1215]: time="2025-05-10T00:37:08.912443620Z" level=info msg="StopPodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" returns successfully" May 10 00:37:08.913042 env[1215]: time="2025-05-10T00:37:08.913011736Z" level=info msg="RemovePodSandbox for \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\"" May 10 00:37:08.913128 env[1215]: time="2025-05-10T00:37:08.913063483Z" level=info msg="Forcibly stopping sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\"" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.946 [WARNING][4759] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0", GenerateName:"calico-apiserver-7c78d4657-", Namespace:"calico-apiserver", SelfLink:"", UID:"112fda21-21dd-48b3-8c0d-f5a5ae17309e", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c78d4657", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"24c35976d4f9dc86e184a4c4beb869e0c48885b44fb433521169037b025ae6ed", Pod:"calico-apiserver-7c78d4657-8jkqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali10a44a919b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.946 [INFO][4759] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.946 [INFO][4759] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" iface="eth0" netns="" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.946 [INFO][4759] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.946 [INFO][4759] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.967 [INFO][4767] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.968 [INFO][4767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.968 [INFO][4767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.974 [WARNING][4767] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.974 [INFO][4767] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" HandleID="k8s-pod-network.c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" Workload="localhost-k8s-calico--apiserver--7c78d4657--8jkqt-eth0" May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.976 [INFO][4767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:08.979598 env[1215]: 2025-05-10 00:37:08.977 [INFO][4759] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569" May 10 00:37:08.980168 env[1215]: time="2025-05-10T00:37:08.979630539Z" level=info msg="TearDown network for sandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" successfully" May 10 00:37:08.983823 env[1215]: time="2025-05-10T00:37:08.983797348Z" level=info msg="RemovePodSandbox \"c8241486866c185f8005eaa9496a0ccbdd5cf9e68423cee7a7c3527201ba8569\" returns successfully" May 10 00:37:08.984322 env[1215]: time="2025-05-10T00:37:08.984286717Z" level=info msg="StopPodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\"" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.018 [WARNING][4790] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9gkns-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6", Pod:"coredns-668d6bf9bc-9gkns", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1180944647d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.018 [INFO][4790] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.018 [INFO][4790] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" iface="eth0" netns="" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.018 [INFO][4790] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.018 [INFO][4790] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.038 [INFO][4799] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.038 [INFO][4799] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.039 [INFO][4799] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.045 [WARNING][4799] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.045 [INFO][4799] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.046 [INFO][4799] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:09.050372 env[1215]: 2025-05-10 00:37:09.048 [INFO][4790] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.050372 env[1215]: time="2025-05-10T00:37:09.050331448Z" level=info msg="TearDown network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" successfully" May 10 00:37:09.050372 env[1215]: time="2025-05-10T00:37:09.050368468Z" level=info msg="StopPodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" returns successfully" May 10 00:37:09.051133 env[1215]: time="2025-05-10T00:37:09.051056599Z" level=info msg="RemovePodSandbox for \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\"" May 10 00:37:09.051164 env[1215]: time="2025-05-10T00:37:09.051118415Z" level=info msg="Forcibly stopping sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\"" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.083 [WARNING][4823] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--9gkns-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"932f65bf-ccfd-435f-86b4-1e2b5b34d9fe", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4953e79bed4d4b8bce7bf684d44a6be1ec3ca21ed57fd7da721147e3214fefd6", Pod:"coredns-668d6bf9bc-9gkns", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1180944647d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.084 [INFO][4823] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.084 [INFO][4823] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" iface="eth0" netns="" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.084 [INFO][4823] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.084 [INFO][4823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.103 [INFO][4832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.103 [INFO][4832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.103 [INFO][4832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.111 [WARNING][4832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.111 [INFO][4832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" HandleID="k8s-pod-network.dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" Workload="localhost-k8s-coredns--668d6bf9bc--9gkns-eth0" May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.112 [INFO][4832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:09.116539 env[1215]: 2025-05-10 00:37:09.115 [INFO][4823] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5" May 10 00:37:09.117036 env[1215]: time="2025-05-10T00:37:09.116590059Z" level=info msg="TearDown network for sandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" successfully" May 10 00:37:09.157556 env[1215]: time="2025-05-10T00:37:09.157487324Z" level=info msg="RemovePodSandbox \"dbb506d4f377ce2cf220bf6c9b64438499eb5068728937345490b81f3fc3cda5\" returns successfully" May 10 00:37:09.158101 env[1215]: time="2025-05-10T00:37:09.158060931Z" level=info msg="StopPodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\"" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.196 [WARNING][4855] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--hc94l-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"39a293e5-816d-4109-845c-1f22b79176b1", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680", Pod:"coredns-668d6bf9bc-hc94l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a01a2cbb7f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.197 [INFO][4855] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.197 [INFO][4855] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" iface="eth0" netns="" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.197 [INFO][4855] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.197 [INFO][4855] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.216 [INFO][4863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.216 [INFO][4863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.216 [INFO][4863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.223 [WARNING][4863] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.223 [INFO][4863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.225 [INFO][4863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:09.229040 env[1215]: 2025-05-10 00:37:09.227 [INFO][4855] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.229508 env[1215]: time="2025-05-10T00:37:09.229061301Z" level=info msg="TearDown network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" successfully" May 10 00:37:09.229508 env[1215]: time="2025-05-10T00:37:09.229099803Z" level=info msg="StopPodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" returns successfully" May 10 00:37:09.229731 env[1215]: time="2025-05-10T00:37:09.229662288Z" level=info msg="RemovePodSandbox for \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\"" May 10 00:37:09.229895 env[1215]: time="2025-05-10T00:37:09.229735536Z" level=info msg="Forcibly stopping sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\"" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.265 [WARNING][4885] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--hc94l-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"39a293e5-816d-4109-845c-1f22b79176b1", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 36, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a10bc1005a1311704fb13847c9fdf4897a9082480c4e7b86500bde91d1754680", Pod:"coredns-668d6bf9bc-hc94l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a01a2cbb7f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.265 [INFO][4885] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.265 [INFO][4885] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" iface="eth0" netns="" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.265 [INFO][4885] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.265 [INFO][4885] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.284 [INFO][4893] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.284 [INFO][4893] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.284 [INFO][4893] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.290 [WARNING][4893] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.290 [INFO][4893] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" HandleID="k8s-pod-network.2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" Workload="localhost-k8s-coredns--668d6bf9bc--hc94l-eth0" May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.291 [INFO][4893] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:37:09.294446 env[1215]: 2025-05-10 00:37:09.293 [INFO][4885] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813" May 10 00:37:09.295058 env[1215]: time="2025-05-10T00:37:09.295010281Z" level=info msg="TearDown network for sandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" successfully" May 10 00:37:09.299341 env[1215]: time="2025-05-10T00:37:09.299303448Z" level=info msg="RemovePodSandbox \"2ad0b1bd3fca6001dcb8c5d3ddfbcdef011c68ea6bf50c91c639e9363b31a813\" returns successfully" May 10 00:37:12.370000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:12.370000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030b5040 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:37:12.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:37:12.370000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:12.370000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bc9aa0 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:37:12.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:37:12.371000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:12.371000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f13aa0 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:37:12.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:37:12.372000 audit[1818]: AVC avc: denied { watch } for pid=1818 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:37:12.372000 audit[1818]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0025b9f60 a2=fc6 a3=0 items=0 ppid=1659 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c967 key=(null) May 10 00:37:12.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:37:13.249988 kubelet[1961]: E0510 00:37:13.249954 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:13.684565 systemd[1]: Started sshd@16-10.0.0.17:22-10.0.0.1:57624.service. May 10 00:37:13.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.17:22-10.0.0.1:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:13.685929 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:37:13.686095 kernel: audit: type=1130 audit(1746837433.684:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.17:22-10.0.0.1:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:13.724000 audit[4925]: USER_ACCT pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.725384 sshd[4925]: Accepted publickey for core from 10.0.0.1 port 57624 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:13.727285 sshd[4925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:13.726000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.731356 systemd-logind[1205]: New session 17 of user core. May 10 00:37:13.732425 systemd[1]: Started session-17.scope. May 10 00:37:13.733668 kernel: audit: type=1101 audit(1746837433.724:1439): pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.733731 kernel: audit: type=1103 audit(1746837433.726:1440): pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.733766 kernel: audit: type=1006 audit(1746837433.726:1441): pid=4925 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:37:13.726000 audit[4925]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe73534e80 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:13.740825 kernel: audit: type=1300 audit(1746837433.726:1441): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe73534e80 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:13.740977 kernel: audit: type=1327 audit(1746837433.726:1441): proctitle=737368643A20636F7265205B707269765D May 10 00:37:13.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:13.742477 kernel: audit: type=1105 audit(1746837433.736:1442): pid=4925 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.736000 audit[4925]: USER_START pid=4925 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.738000 audit[4927]: CRED_ACQ pid=4927 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.752727 kernel: audit: type=1103 audit(1746837433.738:1443): pid=4927 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.899838 sshd[4925]: pam_unix(sshd:session): session closed for user core May 10 00:37:13.900000 audit[4925]: USER_END pid=4925 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.903483 systemd[1]: sshd@16-10.0.0.17:22-10.0.0.1:57624.service: Deactivated successfully. May 10 00:37:13.907835 kernel: audit: type=1106 audit(1746837433.900:1444): pid=4925 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.904262 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:37:13.905198 systemd-logind[1205]: Session 17 logged out. Waiting for processes to exit. May 10 00:37:13.905952 systemd-logind[1205]: Removed session 17. May 10 00:37:13.900000 audit[4925]: CRED_DISP pid=4925 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.919710 kernel: audit: type=1104 audit(1746837433.900:1445): pid=4925 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:13.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.17:22-10.0.0.1:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:18.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.17:22-10.0.0.1:33948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:18.905777 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:37:18.905823 kernel: audit: type=1130 audit(1746837438.902:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.17:22-10.0.0.1:33948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:18.904290 systemd[1]: Started sshd@17-10.0.0.17:22-10.0.0.1:33948.service. May 10 00:37:18.951000 audit[4943]: USER_ACCT pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.953310 sshd[4943]: Accepted publickey for core from 10.0.0.1 port 33948 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:18.955394 sshd[4943]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:18.953000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.959569 systemd-logind[1205]: New session 18 of user core. May 10 00:37:18.960569 systemd[1]: Started session-18.scope. May 10 00:37:18.961712 kernel: audit: type=1101 audit(1746837438.951:1448): pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.961776 kernel: audit: type=1103 audit(1746837438.953:1449): pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.961806 kernel: audit: type=1006 audit(1746837438.953:1450): pid=4943 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:37:18.953000 audit[4943]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe29c210f0 a2=3 a3=0 items=0 ppid=1 pid=4943 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:18.969221 kernel: audit: type=1300 audit(1746837438.953:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe29c210f0 a2=3 a3=0 items=0 ppid=1 pid=4943 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:18.969348 kernel: audit: type=1327 audit(1746837438.953:1450): proctitle=737368643A20636F7265205B707269765D May 10 00:37:18.953000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:18.963000 audit[4943]: USER_START pid=4943 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.975483 kernel: audit: type=1105 audit(1746837438.963:1451): pid=4943 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.975613 kernel: audit: type=1103 audit(1746837438.965:1452): pid=4945 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:18.965000 audit[4945]: CRED_ACQ pid=4945 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:19.082256 sshd[4943]: pam_unix(sshd:session): session closed for user core May 10 00:37:19.081000 audit[4943]: USER_END pid=4943 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:19.084821 systemd[1]: sshd@17-10.0.0.17:22-10.0.0.1:33948.service: Deactivated successfully. May 10 00:37:19.085820 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:37:19.086943 systemd-logind[1205]: Session 18 logged out. Waiting for processes to exit. May 10 00:37:19.087748 systemd-logind[1205]: Removed session 18. May 10 00:37:19.081000 audit[4943]: CRED_DISP pid=4943 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:19.094588 kernel: audit: type=1106 audit(1746837439.081:1453): pid=4943 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:19.094677 kernel: audit: type=1104 audit(1746837439.081:1454): pid=4943 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:19.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.17:22-10.0.0.1:33948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:24.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.17:22-10.0.0.1:33954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:24.088590 systemd[1]: Started sshd@18-10.0.0.17:22-10.0.0.1:33954.service. May 10 00:37:24.090252 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:37:24.090285 kernel: audit: type=1130 audit(1746837444.088:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.17:22-10.0.0.1:33954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:24.138000 audit[4962]: USER_ACCT pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.139630 sshd[4962]: Accepted publickey for core from 10.0.0.1 port 33954 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:24.141183 sshd[4962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:24.139000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.150182 kernel: audit: type=1101 audit(1746837444.138:1457): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.150416 kernel: audit: type=1103 audit(1746837444.139:1458): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.151294 systemd-logind[1205]: New session 19 of user core. May 10 00:37:24.151793 systemd[1]: Started session-19.scope. May 10 00:37:24.139000 audit[4962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc928cc860 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:24.159790 kernel: audit: type=1006 audit(1746837444.139:1459): pid=4962 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 10 00:37:24.159886 kernel: audit: type=1300 audit(1746837444.139:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc928cc860 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:24.139000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:24.162176 kernel: audit: type=1327 audit(1746837444.139:1459): proctitle=737368643A20636F7265205B707269765D May 10 00:37:24.162265 kernel: audit: type=1105 audit(1746837444.159:1460): pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.159000 audit[4962]: USER_START pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.161000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.171552 kernel: audit: type=1103 audit(1746837444.161:1461): pid=4964 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.325617 sshd[4962]: pam_unix(sshd:session): session closed for user core May 10 00:37:24.328000 audit[4962]: USER_END pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.330154 systemd[1]: Started sshd@19-10.0.0.17:22-10.0.0.1:33964.service. May 10 00:37:24.331540 systemd[1]: sshd@18-10.0.0.17:22-10.0.0.1:33954.service: Deactivated successfully. May 10 00:37:24.332403 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:37:24.333176 systemd-logind[1205]: Session 19 logged out. Waiting for processes to exit. May 10 00:37:24.334188 systemd-logind[1205]: Removed session 19. May 10 00:37:24.328000 audit[4962]: CRED_DISP pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.338652 kernel: audit: type=1106 audit(1746837444.328:1462): pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.338724 kernel: audit: type=1104 audit(1746837444.328:1463): pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.17:22-10.0.0.1:33964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:24.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.17:22-10.0.0.1:33954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:24.373000 audit[4974]: USER_ACCT pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.374926 sshd[4974]: Accepted publickey for core from 10.0.0.1 port 33964 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:24.376000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.376000 audit[4974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaaa01880 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:24.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:24.377408 sshd[4974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:24.381375 systemd-logind[1205]: New session 20 of user core. May 10 00:37:24.382221 systemd[1]: Started session-20.scope. May 10 00:37:24.385000 audit[4974]: USER_START pid=4974 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:24.387000 audit[4977]: CRED_ACQ pid=4977 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.013825 sshd[4974]: pam_unix(sshd:session): session closed for user core May 10 00:37:25.014000 audit[4974]: USER_END pid=4974 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.014000 audit[4974]: CRED_DISP pid=4974 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.016845 systemd[1]: sshd@19-10.0.0.17:22-10.0.0.1:33964.service: Deactivated successfully. May 10 00:37:25.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.17:22-10.0.0.1:33964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:25.017406 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:37:25.018061 systemd-logind[1205]: Session 20 logged out. Waiting for processes to exit. May 10 00:37:25.019488 systemd[1]: Started sshd@20-10.0.0.17:22-10.0.0.1:33976.service. May 10 00:37:25.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.17:22-10.0.0.1:33976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:25.020329 systemd-logind[1205]: Removed session 20. May 10 00:37:25.046012 kubelet[1961]: E0510 00:37:25.045966 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:25.060000 audit[4987]: USER_ACCT pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.061578 sshd[4987]: Accepted publickey for core from 10.0.0.1 port 33976 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:25.061000 audit[4987]: CRED_ACQ pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.061000 audit[4987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffce5f74c0 a2=3 a3=0 items=0 ppid=1 pid=4987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:25.062991 sshd[4987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:25.067078 systemd-logind[1205]: New session 21 of user core. May 10 00:37:25.067984 systemd[1]: Started session-21.scope. May 10 00:37:25.072000 audit[4987]: USER_START pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.073000 audit[4989]: CRED_ACQ pid=4989 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.968000 audit[5001]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.968000 audit[5001]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc7374a450 a2=0 a3=7ffc7374a43c items=0 ppid=2147 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:25.972000 audit[5001]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.972000 audit[5001]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc7374a450 a2=0 a3=0 items=0 ppid=2147 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.972000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:25.980292 sshd[4987]: pam_unix(sshd:session): session closed for user core May 10 00:37:25.985000 audit[4987]: USER_END pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.985000 audit[4987]: CRED_DISP pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:25.986774 systemd[1]: Started sshd@21-10.0.0.17:22-10.0.0.1:33984.service. May 10 00:37:25.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.17:22-10.0.0.1:33984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:25.989398 systemd[1]: sshd@20-10.0.0.17:22-10.0.0.1:33976.service: Deactivated successfully. May 10 00:37:25.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.17:22-10.0.0.1:33976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:25.988000 audit[5005]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.988000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed3208b00 a2=0 a3=7ffed3208aec items=0 ppid=2147 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:25.990166 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:37:25.991240 systemd-logind[1205]: Session 21 logged out. Waiting for processes to exit. May 10 00:37:25.992197 systemd-logind[1205]: Removed session 21. May 10 00:37:25.993000 audit[5005]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:25.993000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed3208b00 a2=0 a3=0 items=0 ppid=2147 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:25.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:26.027000 audit[5004]: USER_ACCT pid=5004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.028950 sshd[5004]: Accepted publickey for core from 10.0.0.1 port 33984 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:26.029000 audit[5004]: CRED_ACQ pid=5004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.029000 audit[5004]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd64e95310 a2=3 a3=0 items=0 ppid=1 pid=5004 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.029000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:26.030292 sshd[5004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:26.034719 systemd-logind[1205]: New session 22 of user core. May 10 00:37:26.035696 systemd[1]: Started session-22.scope. May 10 00:37:26.040000 audit[5004]: USER_START pid=5004 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.041000 audit[5008]: CRED_ACQ pid=5008 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.046644 kubelet[1961]: E0510 00:37:26.045915 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:26.473399 sshd[5004]: pam_unix(sshd:session): session closed for user core May 10 00:37:26.473000 audit[5004]: USER_END pid=5004 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.474000 audit[5004]: CRED_DISP pid=5004 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.476331 systemd[1]: sshd@21-10.0.0.17:22-10.0.0.1:33984.service: Deactivated successfully. May 10 00:37:26.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.17:22-10.0.0.1:33984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:26.476951 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:37:26.479251 systemd[1]: Started sshd@22-10.0.0.17:22-10.0.0.1:33994.service. May 10 00:37:26.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.17:22-10.0.0.1:33994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:26.479924 systemd-logind[1205]: Session 22 logged out. Waiting for processes to exit. May 10 00:37:26.481254 systemd-logind[1205]: Removed session 22. May 10 00:37:26.519000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.520639 sshd[5017]: Accepted publickey for core from 10.0.0.1 port 33994 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:26.521000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.521000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5b8bab0 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:26.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:26.522445 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:26.527306 systemd-logind[1205]: New session 23 of user core. May 10 00:37:26.528256 systemd[1]: Started session-23.scope. May 10 00:37:26.532000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.534000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.651562 sshd[5017]: pam_unix(sshd:session): session closed for user core May 10 00:37:26.651000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.652000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:26.654539 systemd[1]: sshd@22-10.0.0.17:22-10.0.0.1:33994.service: Deactivated successfully. May 10 00:37:26.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.17:22-10.0.0.1:33994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:26.655374 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:37:26.655965 systemd-logind[1205]: Session 23 logged out. Waiting for processes to exit. May 10 00:37:26.656615 systemd-logind[1205]: Removed session 23. May 10 00:37:31.656416 systemd[1]: Started sshd@23-10.0.0.17:22-10.0.0.1:40426.service. May 10 00:37:31.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.17:22-10.0.0.1:40426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:31.660365 kernel: kauditd_printk_skb: 57 callbacks suppressed May 10 00:37:31.660488 kernel: audit: type=1130 audit(1746837451.655:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.17:22-10.0.0.1:40426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:31.712000 audit[5052]: USER_ACCT pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.713583 sshd[5052]: Accepted publickey for core from 10.0.0.1 port 40426 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:31.715659 sshd[5052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:31.714000 audit[5052]: CRED_ACQ pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.719717 systemd-logind[1205]: New session 24 of user core. May 10 00:37:31.720567 systemd[1]: Started session-24.scope. May 10 00:37:31.722367 kernel: audit: type=1101 audit(1746837451.712:1506): pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.722416 kernel: audit: type=1103 audit(1746837451.714:1507): pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.722441 kernel: audit: type=1006 audit(1746837451.714:1508): pid=5052 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:37:31.724704 kernel: audit: type=1300 audit(1746837451.714:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc54802910 a2=3 a3=0 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:31.714000 audit[5052]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc54802910 a2=3 a3=0 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:31.714000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:31.730457 kernel: audit: type=1327 audit(1746837451.714:1508): proctitle=737368643A20636F7265205B707269765D May 10 00:37:31.730496 kernel: audit: type=1105 audit(1746837451.724:1509): pid=5052 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.724000 audit[5052]: USER_START pid=5052 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.726000 audit[5054]: CRED_ACQ pid=5054 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.738496 kernel: audit: type=1103 audit(1746837451.726:1510): pid=5054 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.855828 sshd[5052]: pam_unix(sshd:session): session closed for user core May 10 00:37:31.856000 audit[5052]: USER_END pid=5052 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.858454 systemd[1]: sshd@23-10.0.0.17:22-10.0.0.1:40426.service: Deactivated successfully. May 10 00:37:31.859402 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:37:31.856000 audit[5052]: CRED_DISP pid=5052 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.863287 systemd-logind[1205]: Session 24 logged out. Waiting for processes to exit. May 10 00:37:31.864006 systemd-logind[1205]: Removed session 24. May 10 00:37:31.865676 kernel: audit: type=1106 audit(1746837451.856:1511): pid=5052 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.865755 kernel: audit: type=1104 audit(1746837451.856:1512): pid=5052 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:31.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.17:22-10.0.0.1:40426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:33.046248 kubelet[1961]: E0510 00:37:33.046198 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:33.215000 audit[5065]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:33.215000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcf6426330 a2=0 a3=7ffcf642631c items=0 ppid=2147 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:33.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:33.220000 audit[5065]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:37:33.220000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf6426330 a2=0 a3=7ffcf642631c items=0 ppid=2147 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:33.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:37:36.862513 systemd[1]: Started sshd@24-10.0.0.17:22-10.0.0.1:55878.service. May 10 00:37:36.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.17:22-10.0.0.1:55878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:36.863822 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:37:36.863890 kernel: audit: type=1130 audit(1746837456.862:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.17:22-10.0.0.1:55878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:36.901000 audit[5067]: USER_ACCT pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.902771 sshd[5067]: Accepted publickey for core from 10.0.0.1 port 55878 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:36.906000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.907458 sshd[5067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:36.907712 kernel: audit: type=1101 audit(1746837456.901:1517): pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.907760 kernel: audit: type=1103 audit(1746837456.906:1518): pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.911314 systemd-logind[1205]: New session 25 of user core. May 10 00:37:36.912340 systemd[1]: Started session-25.scope. May 10 00:37:36.912720 kernel: audit: type=1006 audit(1746837456.906:1519): pid=5067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:37:36.906000 audit[5067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff23dfe8a0 a2=3 a3=0 items=0 ppid=1 pid=5067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:36.921974 kernel: audit: type=1300 audit(1746837456.906:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff23dfe8a0 a2=3 a3=0 items=0 ppid=1 pid=5067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:36.922044 kernel: audit: type=1327 audit(1746837456.906:1519): proctitle=737368643A20636F7265205B707269765D May 10 00:37:36.906000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:36.915000 audit[5067]: USER_START pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.929880 kernel: audit: type=1105 audit(1746837456.915:1520): pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.929955 kernel: audit: type=1103 audit(1746837456.915:1521): pid=5069 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:36.915000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:37.021115 sshd[5067]: pam_unix(sshd:session): session closed for user core May 10 00:37:37.021000 audit[5067]: USER_END pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:37.023434 systemd[1]: sshd@24-10.0.0.17:22-10.0.0.1:55878.service: Deactivated successfully. May 10 00:37:37.024268 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:37:37.024843 systemd-logind[1205]: Session 25 logged out. Waiting for processes to exit. May 10 00:37:37.025528 systemd-logind[1205]: Removed session 25. May 10 00:37:37.021000 audit[5067]: CRED_DISP pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:37.033886 kernel: audit: type=1106 audit(1746837457.021:1522): pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:37.033960 kernel: audit: type=1104 audit(1746837457.021:1523): pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:37.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.17:22-10.0.0.1:55878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:42.028718 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:37:42.028863 kernel: audit: type=1130 audit(1746837462.025:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.17:22-10.0.0.1:55888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:42.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.17:22-10.0.0.1:55888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:42.026614 systemd[1]: Started sshd@25-10.0.0.17:22-10.0.0.1:55888.service. May 10 00:37:42.103000 audit[5080]: USER_ACCT pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.104539 sshd[5080]: Accepted publickey for core from 10.0.0.1 port 55888 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:42.113071 kernel: audit: type=1101 audit(1746837462.103:1526): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.113233 kernel: audit: type=1103 audit(1746837462.104:1527): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.104000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.112058 sshd[5080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:42.122981 kernel: audit: type=1006 audit(1746837462.104:1528): pid=5080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:37:42.123110 kernel: audit: type=1300 audit(1746837462.104:1528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcefea8af0 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:42.104000 audit[5080]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcefea8af0 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:42.121080 systemd[1]: Started session-26.scope. May 10 00:37:42.121415 systemd-logind[1205]: New session 26 of user core. May 10 00:37:42.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:42.127059 kernel: audit: type=1327 audit(1746837462.104:1528): proctitle=737368643A20636F7265205B707269765D May 10 00:37:42.126000 audit[5080]: USER_START pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.128000 audit[5082]: CRED_ACQ pid=5082 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.136400 kernel: audit: type=1105 audit(1746837462.126:1529): pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.136486 kernel: audit: type=1103 audit(1746837462.128:1530): pid=5082 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.283463 sshd[5080]: pam_unix(sshd:session): session closed for user core May 10 00:37:42.283000 audit[5080]: USER_END pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.286470 systemd[1]: sshd@25-10.0.0.17:22-10.0.0.1:55888.service: Deactivated successfully. May 10 00:37:42.287253 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:37:42.287909 systemd-logind[1205]: Session 26 logged out. Waiting for processes to exit. May 10 00:37:42.288665 systemd-logind[1205]: Removed session 26. May 10 00:37:42.283000 audit[5080]: CRED_DISP pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.295814 kernel: audit: type=1106 audit(1746837462.283:1531): pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.295936 kernel: audit: type=1104 audit(1746837462.283:1532): pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:42.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.17:22-10.0.0.1:55888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:46.046811 kubelet[1961]: E0510 00:37:46.046758 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:37:47.288096 systemd[1]: Started sshd@26-10.0.0.17:22-10.0.0.1:52718.service. May 10 00:37:47.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.17:22-10.0.0.1:52718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:47.289798 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:37:47.289850 kernel: audit: type=1130 audit(1746837467.286:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.17:22-10.0.0.1:52718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:47.328000 audit[5119]: USER_ACCT pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.330167 sshd[5119]: Accepted publickey for core from 10.0.0.1 port 52718 ssh2: RSA SHA256:UAZuqaEvcZ7amF/zpPScB8FCd5As1AjirhZqVj0HQs0 May 10 00:37:47.331244 sshd[5119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:37:47.343728 kernel: audit: type=1101 audit(1746837467.328:1535): pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.344010 kernel: audit: type=1103 audit(1746837467.329:1536): pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.344041 kernel: audit: type=1006 audit(1746837467.329:1537): pid=5119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:37:47.344071 kernel: audit: type=1300 audit(1746837467.329:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce2905330 a2=3 a3=0 items=0 ppid=1 pid=5119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:47.344109 kernel: audit: type=1327 audit(1746837467.329:1537): proctitle=737368643A20636F7265205B707269765D May 10 00:37:47.329000 audit[5119]: CRED_ACQ pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.329000 audit[5119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce2905330 a2=3 a3=0 items=0 ppid=1 pid=5119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:37:47.329000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:37:47.337736 systemd-logind[1205]: New session 27 of user core. May 10 00:37:47.338238 systemd[1]: Started session-27.scope. May 10 00:37:47.345473 kernel: audit: type=1105 audit(1746837467.341:1538): pid=5119 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.341000 audit[5119]: USER_START pid=5119 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.343000 audit[5121]: CRED_ACQ pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.353196 kernel: audit: type=1103 audit(1746837467.343:1539): pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.467463 sshd[5119]: pam_unix(sshd:session): session closed for user core May 10 00:37:47.466000 audit[5119]: USER_END pid=5119 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.470213 systemd[1]: sshd@26-10.0.0.17:22-10.0.0.1:52718.service: Deactivated successfully. May 10 00:37:47.471000 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:37:47.471765 systemd-logind[1205]: Session 27 logged out. Waiting for processes to exit. May 10 00:37:47.472609 systemd-logind[1205]: Removed session 27. May 10 00:37:47.466000 audit[5119]: CRED_DISP pid=5119 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.476704 kernel: audit: type=1106 audit(1746837467.466:1540): pid=5119 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.476764 kernel: audit: type=1104 audit(1746837467.466:1541): pid=5119 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:37:47.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.17:22-10.0.0.1:52718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:37:48.047239 kubelet[1961]: E0510 00:37:48.047193 1961 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"