May 15 00:52:41.838103 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 00:52:41.838122 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:52:41.838130 kernel: BIOS-provided physical RAM map: May 15 00:52:41.838135 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 00:52:41.838141 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 00:52:41.838146 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 00:52:41.838153 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 15 00:52:41.838158 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 15 00:52:41.838165 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:52:41.838171 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 15 00:52:41.838176 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 00:52:41.838181 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 00:52:41.838187 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 00:52:41.838192 kernel: NX (Execute Disable) protection: active May 15 00:52:41.838201 kernel: SMBIOS 2.8 present. May 15 00:52:41.838207 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 15 00:52:41.838213 kernel: Hypervisor detected: KVM May 15 00:52:41.838219 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 00:52:41.838225 kernel: kvm-clock: cpu 0, msr 46196001, primary cpu clock May 15 00:52:41.838230 kernel: kvm-clock: using sched offset of 2412637677 cycles May 15 00:52:41.838237 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 00:52:41.838243 kernel: tsc: Detected 2794.748 MHz processor May 15 00:52:41.838249 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 00:52:41.838257 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 00:52:41.838263 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 15 00:52:41.838269 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 00:52:41.838275 kernel: Using GB pages for direct mapping May 15 00:52:41.838281 kernel: ACPI: Early table checksum verification disabled May 15 00:52:41.838287 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 15 00:52:41.838293 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838299 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838305 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838312 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 15 00:52:41.838319 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838325 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838331 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838337 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:52:41.838343 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 15 00:52:41.838349 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 15 00:52:41.838355 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 15 00:52:41.838365 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 15 00:52:41.838371 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 15 00:52:41.838378 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 15 00:52:41.838384 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 15 00:52:41.838390 kernel: No NUMA configuration found May 15 00:52:41.838397 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 15 00:52:41.838412 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 15 00:52:41.838419 kernel: Zone ranges: May 15 00:52:41.838425 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 00:52:41.838432 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 15 00:52:41.838438 kernel: Normal empty May 15 00:52:41.838444 kernel: Movable zone start for each node May 15 00:52:41.838451 kernel: Early memory node ranges May 15 00:52:41.838457 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 00:52:41.838464 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 15 00:52:41.838470 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 15 00:52:41.838478 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:52:41.838484 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 00:52:41.838491 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 15 00:52:41.838497 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 00:52:41.838504 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 00:52:41.838510 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 00:52:41.838516 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 00:52:41.838523 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 00:52:41.838529 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 00:52:41.838537 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 00:52:41.838544 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 00:52:41.838550 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 00:52:41.838556 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 00:52:41.838563 kernel: TSC deadline timer available May 15 00:52:41.838569 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 00:52:41.838576 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 00:52:41.838582 kernel: kvm-guest: setup PV sched yield May 15 00:52:41.838589 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 15 00:52:41.838596 kernel: Booting paravirtualized kernel on KVM May 15 00:52:41.838603 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 00:52:41.838609 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 00:52:41.838616 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 00:52:41.838622 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 00:52:41.838628 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 00:52:41.838635 kernel: kvm-guest: setup async PF for cpu 0 May 15 00:52:41.838641 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 15 00:52:41.838647 kernel: kvm-guest: PV spinlocks enabled May 15 00:52:41.838655 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 00:52:41.838661 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 15 00:52:41.838668 kernel: Policy zone: DMA32 May 15 00:52:41.838675 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:52:41.838682 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 00:52:41.838689 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 00:52:41.838695 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 00:52:41.838702 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 00:52:41.838710 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 134796K reserved, 0K cma-reserved) May 15 00:52:41.838717 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 00:52:41.838723 kernel: ftrace: allocating 34584 entries in 136 pages May 15 00:52:41.838729 kernel: ftrace: allocated 136 pages with 2 groups May 15 00:52:41.838736 kernel: rcu: Hierarchical RCU implementation. May 15 00:52:41.838743 kernel: rcu: RCU event tracing is enabled. May 15 00:52:41.838749 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 00:52:41.838756 kernel: Rude variant of Tasks RCU enabled. May 15 00:52:41.838762 kernel: Tracing variant of Tasks RCU enabled. May 15 00:52:41.838771 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 00:52:41.838777 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 00:52:41.838784 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 00:52:41.838790 kernel: random: crng init done May 15 00:52:41.838797 kernel: Console: colour VGA+ 80x25 May 15 00:52:41.838803 kernel: printk: console [ttyS0] enabled May 15 00:52:41.838809 kernel: ACPI: Core revision 20210730 May 15 00:52:41.838816 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 00:52:41.838823 kernel: APIC: Switch to symmetric I/O mode setup May 15 00:52:41.838830 kernel: x2apic enabled May 15 00:52:41.838837 kernel: Switched APIC routing to physical x2apic. May 15 00:52:41.838843 kernel: kvm-guest: setup PV IPIs May 15 00:52:41.838850 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 00:52:41.838856 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 00:52:41.838863 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 00:52:41.838869 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 00:52:41.838876 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 00:52:41.838883 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 00:52:41.838895 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 00:52:41.838902 kernel: Spectre V2 : Mitigation: Retpolines May 15 00:52:41.838908 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 00:52:41.838916 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 00:52:41.838923 kernel: RETBleed: Mitigation: untrained return thunk May 15 00:52:41.838930 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 00:52:41.838937 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 00:52:41.838952 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 00:52:41.838960 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 00:52:41.838968 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 00:52:41.838974 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 00:52:41.838981 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 00:52:41.838988 kernel: Freeing SMP alternatives memory: 32K May 15 00:52:41.838995 kernel: pid_max: default: 32768 minimum: 301 May 15 00:52:41.839002 kernel: LSM: Security Framework initializing May 15 00:52:41.839009 kernel: SELinux: Initializing. May 15 00:52:41.839016 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:52:41.839024 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:52:41.839031 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 00:52:41.839038 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 00:52:41.839045 kernel: ... version: 0 May 15 00:52:41.839051 kernel: ... bit width: 48 May 15 00:52:41.839058 kernel: ... generic registers: 6 May 15 00:52:41.839065 kernel: ... value mask: 0000ffffffffffff May 15 00:52:41.839072 kernel: ... max period: 00007fffffffffff May 15 00:52:41.839078 kernel: ... fixed-purpose events: 0 May 15 00:52:41.839086 kernel: ... event mask: 000000000000003f May 15 00:52:41.839093 kernel: signal: max sigframe size: 1776 May 15 00:52:41.839100 kernel: rcu: Hierarchical SRCU implementation. May 15 00:52:41.839106 kernel: smp: Bringing up secondary CPUs ... May 15 00:52:41.839113 kernel: x86: Booting SMP configuration: May 15 00:52:41.839120 kernel: .... node #0, CPUs: #1 May 15 00:52:41.839127 kernel: kvm-clock: cpu 1, msr 46196041, secondary cpu clock May 15 00:52:41.839133 kernel: kvm-guest: setup async PF for cpu 1 May 15 00:52:41.839140 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 15 00:52:41.839148 kernel: #2 May 15 00:52:41.839155 kernel: kvm-clock: cpu 2, msr 46196081, secondary cpu clock May 15 00:52:41.839162 kernel: kvm-guest: setup async PF for cpu 2 May 15 00:52:41.839168 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 15 00:52:41.839175 kernel: #3 May 15 00:52:41.839182 kernel: kvm-clock: cpu 3, msr 461960c1, secondary cpu clock May 15 00:52:41.839188 kernel: kvm-guest: setup async PF for cpu 3 May 15 00:52:41.839195 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 15 00:52:41.839202 kernel: smp: Brought up 1 node, 4 CPUs May 15 00:52:41.839210 kernel: smpboot: Max logical packages: 1 May 15 00:52:41.839217 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 00:52:41.839223 kernel: devtmpfs: initialized May 15 00:52:41.839230 kernel: x86/mm: Memory block size: 128MB May 15 00:52:41.839237 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 00:52:41.839244 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 00:52:41.839251 kernel: pinctrl core: initialized pinctrl subsystem May 15 00:52:41.839257 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 00:52:41.839264 kernel: audit: initializing netlink subsys (disabled) May 15 00:52:41.839271 kernel: audit: type=2000 audit(1747270362.146:1): state=initialized audit_enabled=0 res=1 May 15 00:52:41.839279 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 00:52:41.839286 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 00:52:41.839293 kernel: cpuidle: using governor menu May 15 00:52:41.839299 kernel: ACPI: bus type PCI registered May 15 00:52:41.839306 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 00:52:41.839313 kernel: dca service started, version 1.12.1 May 15 00:52:41.839320 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 00:52:41.839327 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 00:52:41.839334 kernel: PCI: Using configuration type 1 for base access May 15 00:52:41.839342 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 00:52:41.839349 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 00:52:41.839355 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 00:52:41.839362 kernel: ACPI: Added _OSI(Module Device) May 15 00:52:41.839369 kernel: ACPI: Added _OSI(Processor Device) May 15 00:52:41.839376 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 00:52:41.839382 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 00:52:41.839389 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 00:52:41.839396 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 00:52:41.839411 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 00:52:41.839417 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 00:52:41.839424 kernel: ACPI: Interpreter enabled May 15 00:52:41.839431 kernel: ACPI: PM: (supports S0 S3 S5) May 15 00:52:41.839438 kernel: ACPI: Using IOAPIC for interrupt routing May 15 00:52:41.839445 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 00:52:41.839451 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 00:52:41.839458 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 00:52:41.839574 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 00:52:41.839648 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 00:52:41.839717 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 00:52:41.839727 kernel: PCI host bridge to bus 0000:00 May 15 00:52:41.839804 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 00:52:41.839865 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 00:52:41.839926 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 00:52:41.840003 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 00:52:41.840066 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 00:52:41.840131 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 15 00:52:41.840192 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 00:52:41.840279 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 00:52:41.840356 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 00:52:41.840439 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 15 00:52:41.840507 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 15 00:52:41.840575 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 15 00:52:41.840644 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 00:52:41.840719 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 00:52:41.840788 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 15 00:52:41.840859 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 15 00:52:41.840930 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 15 00:52:41.841027 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 00:52:41.841098 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 15 00:52:41.841166 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 15 00:52:41.841236 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 15 00:52:41.841313 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 00:52:41.841384 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 15 00:52:41.841467 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 15 00:52:41.841704 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 15 00:52:41.841776 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 15 00:52:41.841848 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 00:52:41.841921 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 00:52:41.842014 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 00:52:41.842082 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 15 00:52:41.842153 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 15 00:52:41.842244 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 00:52:41.842313 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 15 00:52:41.842322 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 00:52:41.842329 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 00:52:41.842336 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 00:52:41.842343 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 00:52:41.842352 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 00:52:41.842359 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 00:52:41.842366 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 00:52:41.842373 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 00:52:41.842380 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 00:52:41.842387 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 00:52:41.842394 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 00:52:41.842401 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 00:52:41.842433 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 00:52:41.842442 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 00:52:41.842449 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 00:52:41.842456 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 00:52:41.842463 kernel: iommu: Default domain type: Translated May 15 00:52:41.842470 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 00:52:41.842542 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 00:52:41.842610 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 00:52:41.842677 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 00:52:41.842687 kernel: vgaarb: loaded May 15 00:52:41.842696 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 00:52:41.842703 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 00:52:41.842709 kernel: PTP clock support registered May 15 00:52:41.842716 kernel: PCI: Using ACPI for IRQ routing May 15 00:52:41.842723 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 00:52:41.842730 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 00:52:41.842737 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 15 00:52:41.842743 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 00:52:41.842750 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 00:52:41.842758 kernel: clocksource: Switched to clocksource kvm-clock May 15 00:52:41.842765 kernel: VFS: Disk quotas dquot_6.6.0 May 15 00:52:41.842772 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 00:52:41.842779 kernel: pnp: PnP ACPI init May 15 00:52:41.842852 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 00:52:41.842863 kernel: pnp: PnP ACPI: found 6 devices May 15 00:52:41.842870 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 00:52:41.842877 kernel: NET: Registered PF_INET protocol family May 15 00:52:41.842885 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 00:52:41.842892 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 00:52:41.842899 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 00:52:41.842906 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 00:52:41.842913 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 00:52:41.842920 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 00:52:41.842927 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:52:41.842933 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:52:41.842940 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 00:52:41.842965 kernel: NET: Registered PF_XDP protocol family May 15 00:52:41.843027 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 00:52:41.843088 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 00:52:41.843153 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 00:52:41.843212 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 00:52:41.843272 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 00:52:41.843330 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 15 00:52:41.843339 kernel: PCI: CLS 0 bytes, default 64 May 15 00:52:41.843349 kernel: Initialise system trusted keyrings May 15 00:52:41.843356 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 00:52:41.843363 kernel: Key type asymmetric registered May 15 00:52:41.843369 kernel: Asymmetric key parser 'x509' registered May 15 00:52:41.843376 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 00:52:41.843383 kernel: io scheduler mq-deadline registered May 15 00:52:41.843390 kernel: io scheduler kyber registered May 15 00:52:41.843396 kernel: io scheduler bfq registered May 15 00:52:41.843411 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 00:52:41.843421 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 00:52:41.843428 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 00:52:41.843435 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 00:52:41.843441 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 00:52:41.843448 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 00:52:41.843455 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 00:52:41.843462 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 00:52:41.843469 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 00:52:41.843541 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 00:52:41.843553 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 00:52:41.843613 kernel: rtc_cmos 00:04: registered as rtc0 May 15 00:52:41.843675 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T00:52:41 UTC (1747270361) May 15 00:52:41.843737 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 00:52:41.843746 kernel: NET: Registered PF_INET6 protocol family May 15 00:52:41.843752 kernel: Segment Routing with IPv6 May 15 00:52:41.843759 kernel: In-situ OAM (IOAM) with IPv6 May 15 00:52:41.843766 kernel: NET: Registered PF_PACKET protocol family May 15 00:52:41.843775 kernel: Key type dns_resolver registered May 15 00:52:41.843782 kernel: IPI shorthand broadcast: enabled May 15 00:52:41.843789 kernel: sched_clock: Marking stable (394002857, 101213601)->(543112023, -47895565) May 15 00:52:41.843796 kernel: registered taskstats version 1 May 15 00:52:41.843802 kernel: Loading compiled-in X.509 certificates May 15 00:52:41.843809 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 00:52:41.843816 kernel: Key type .fscrypt registered May 15 00:52:41.843823 kernel: Key type fscrypt-provisioning registered May 15 00:52:41.843830 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 00:52:41.843838 kernel: ima: Allocated hash algorithm: sha1 May 15 00:52:41.843845 kernel: ima: No architecture policies found May 15 00:52:41.843851 kernel: clk: Disabling unused clocks May 15 00:52:41.843858 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 00:52:41.843865 kernel: Write protecting the kernel read-only data: 28672k May 15 00:52:41.843872 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 00:52:41.843879 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 00:52:41.843885 kernel: Run /init as init process May 15 00:52:41.843892 kernel: with arguments: May 15 00:52:41.843900 kernel: /init May 15 00:52:41.843907 kernel: with environment: May 15 00:52:41.843913 kernel: HOME=/ May 15 00:52:41.843920 kernel: TERM=linux May 15 00:52:41.843927 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 00:52:41.843936 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:52:41.843971 systemd[1]: Detected virtualization kvm. May 15 00:52:41.843979 systemd[1]: Detected architecture x86-64. May 15 00:52:41.843988 systemd[1]: Running in initrd. May 15 00:52:41.843995 systemd[1]: No hostname configured, using default hostname. May 15 00:52:41.844003 systemd[1]: Hostname set to . May 15 00:52:41.844010 systemd[1]: Initializing machine ID from VM UUID. May 15 00:52:41.844017 systemd[1]: Queued start job for default target initrd.target. May 15 00:52:41.844025 systemd[1]: Started systemd-ask-password-console.path. May 15 00:52:41.844032 systemd[1]: Reached target cryptsetup.target. May 15 00:52:41.844039 systemd[1]: Reached target paths.target. May 15 00:52:41.844048 systemd[1]: Reached target slices.target. May 15 00:52:41.844061 systemd[1]: Reached target swap.target. May 15 00:52:41.844069 systemd[1]: Reached target timers.target. May 15 00:52:41.844077 systemd[1]: Listening on iscsid.socket. May 15 00:52:41.844084 systemd[1]: Listening on iscsiuio.socket. May 15 00:52:41.844093 systemd[1]: Listening on systemd-journald-audit.socket. May 15 00:52:41.844101 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 00:52:41.844108 systemd[1]: Listening on systemd-journald.socket. May 15 00:52:41.844116 systemd[1]: Listening on systemd-networkd.socket. May 15 00:52:41.844123 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:52:41.844131 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:52:41.844138 systemd[1]: Reached target sockets.target. May 15 00:52:41.844146 systemd[1]: Starting kmod-static-nodes.service... May 15 00:52:41.844153 systemd[1]: Finished network-cleanup.service. May 15 00:52:41.844162 systemd[1]: Starting systemd-fsck-usr.service... May 15 00:52:41.844170 systemd[1]: Starting systemd-journald.service... May 15 00:52:41.844177 systemd[1]: Starting systemd-modules-load.service... May 15 00:52:41.844185 systemd[1]: Starting systemd-resolved.service... May 15 00:52:41.844192 systemd[1]: Starting systemd-vconsole-setup.service... May 15 00:52:41.844200 systemd[1]: Finished kmod-static-nodes.service. May 15 00:52:41.844207 systemd[1]: Finished systemd-fsck-usr.service. May 15 00:52:41.844215 kernel: audit: type=1130 audit(1747270361.836:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.844223 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 00:52:41.844234 systemd-journald[197]: Journal started May 15 00:52:41.844271 systemd-journald[197]: Runtime Journal (/run/log/journal/e235b65e74594c6d8a587b43233e1aa4) is 6.0M, max 48.5M, 42.5M free. May 15 00:52:41.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.846092 systemd[1]: Started systemd-journald.service. May 15 00:52:41.850014 kernel: audit: type=1130 audit(1747270361.846:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.848613 systemd-modules-load[198]: Inserted module 'overlay' May 15 00:52:41.888135 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 00:52:41.888159 kernel: audit: type=1130 audit(1747270361.882:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.888170 kernel: Bridge firewalling registered May 15 00:52:41.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.850140 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 00:52:41.892560 kernel: audit: type=1130 audit(1747270361.887:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.855220 systemd-resolved[199]: Positive Trust Anchors: May 15 00:52:41.896457 kernel: audit: type=1130 audit(1747270361.892:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.855229 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:52:41.855255 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:52:41.857316 systemd-resolved[199]: Defaulting to hostname 'linux'. May 15 00:52:41.883820 systemd[1]: Started systemd-resolved.service. May 15 00:52:41.887481 systemd-modules-load[198]: Inserted module 'br_netfilter' May 15 00:52:41.888990 systemd[1]: Finished systemd-vconsole-setup.service. May 15 00:52:41.893462 systemd[1]: Reached target nss-lookup.target. May 15 00:52:41.899004 systemd[1]: Starting dracut-cmdline-ask.service... May 15 00:52:41.910973 kernel: SCSI subsystem initialized May 15 00:52:41.922025 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 00:52:41.922047 kernel: device-mapper: uevent: version 1.0.3 May 15 00:52:41.922273 systemd[1]: Finished dracut-cmdline-ask.service. May 15 00:52:41.928103 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 00:52:41.928117 kernel: audit: type=1130 audit(1747270361.922:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.923102 systemd[1]: Starting dracut-cmdline.service... May 15 00:52:41.928791 systemd-modules-load[198]: Inserted module 'dm_multipath' May 15 00:52:41.934099 kernel: audit: type=1130 audit(1747270361.929:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.929441 systemd[1]: Finished systemd-modules-load.service. May 15 00:52:41.930902 systemd[1]: Starting systemd-sysctl.service... May 15 00:52:41.939138 systemd[1]: Finished systemd-sysctl.service. May 15 00:52:41.943342 kernel: audit: type=1130 audit(1747270361.938:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:41.943385 dracut-cmdline[216]: dracut-dracut-053 May 15 00:52:41.945474 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:52:41.999975 kernel: Loading iSCSI transport class v2.0-870. May 15 00:52:42.015973 kernel: iscsi: registered transport (tcp) May 15 00:52:42.036305 kernel: iscsi: registered transport (qla4xxx) May 15 00:52:42.036331 kernel: QLogic iSCSI HBA Driver May 15 00:52:42.061442 systemd[1]: Finished dracut-cmdline.service. May 15 00:52:42.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:42.065869 systemd[1]: Starting dracut-pre-udev.service... May 15 00:52:42.065969 kernel: audit: type=1130 audit(1747270362.062:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:42.110974 kernel: raid6: avx2x4 gen() 30095 MB/s May 15 00:52:42.127968 kernel: raid6: avx2x4 xor() 7443 MB/s May 15 00:52:42.144965 kernel: raid6: avx2x2 gen() 32283 MB/s May 15 00:52:42.161967 kernel: raid6: avx2x2 xor() 19137 MB/s May 15 00:52:42.178966 kernel: raid6: avx2x1 gen() 26635 MB/s May 15 00:52:42.195970 kernel: raid6: avx2x1 xor() 15359 MB/s May 15 00:52:42.212967 kernel: raid6: sse2x4 gen() 14707 MB/s May 15 00:52:42.229967 kernel: raid6: sse2x4 xor() 7092 MB/s May 15 00:52:42.246971 kernel: raid6: sse2x2 gen() 16215 MB/s May 15 00:52:42.263969 kernel: raid6: sse2x2 xor() 9845 MB/s May 15 00:52:42.280966 kernel: raid6: sse2x1 gen() 12123 MB/s May 15 00:52:42.298350 kernel: raid6: sse2x1 xor() 7817 MB/s May 15 00:52:42.298367 kernel: raid6: using algorithm avx2x2 gen() 32283 MB/s May 15 00:52:42.298376 kernel: raid6: .... xor() 19137 MB/s, rmw enabled May 15 00:52:42.299071 kernel: raid6: using avx2x2 recovery algorithm May 15 00:52:42.310970 kernel: xor: automatically using best checksumming function avx May 15 00:52:42.397993 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 00:52:42.404987 systemd[1]: Finished dracut-pre-udev.service. May 15 00:52:42.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:42.406000 audit: BPF prog-id=7 op=LOAD May 15 00:52:42.406000 audit: BPF prog-id=8 op=LOAD May 15 00:52:42.407015 systemd[1]: Starting systemd-udevd.service... May 15 00:52:42.418793 systemd-udevd[400]: Using default interface naming scheme 'v252'. May 15 00:52:42.422212 systemd[1]: Started systemd-udevd.service. May 15 00:52:42.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:42.422878 systemd[1]: Starting dracut-pre-trigger.service... May 15 00:52:42.432359 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation May 15 00:52:42.455839 systemd[1]: Finished dracut-pre-trigger.service. May 15 00:52:42.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:42.458093 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:52:42.489443 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:52:42.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:42.519023 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 00:52:42.526596 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 00:52:42.526610 kernel: GPT:9289727 != 19775487 May 15 00:52:42.526618 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 00:52:42.526627 kernel: GPT:9289727 != 19775487 May 15 00:52:42.526635 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 00:52:42.526643 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:52:42.526657 kernel: cryptd: max_cpu_qlen set to 1000 May 15 00:52:42.529990 kernel: libata version 3.00 loaded. May 15 00:52:42.538339 kernel: AVX2 version of gcm_enc/dec engaged. May 15 00:52:42.538360 kernel: AES CTR mode by8 optimization enabled May 15 00:52:42.538370 kernel: ahci 0000:00:1f.2: version 3.0 May 15 00:52:42.555918 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 00:52:42.555936 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 00:52:42.556047 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 00:52:42.556127 kernel: scsi host0: ahci May 15 00:52:42.556217 kernel: scsi host1: ahci May 15 00:52:42.556358 kernel: scsi host2: ahci May 15 00:52:42.556501 kernel: scsi host3: ahci May 15 00:52:42.556592 kernel: scsi host4: ahci May 15 00:52:42.556679 kernel: scsi host5: ahci May 15 00:52:42.556763 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 15 00:52:42.556773 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 15 00:52:42.556781 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 15 00:52:42.556790 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 15 00:52:42.556798 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 15 00:52:42.556806 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 15 00:52:42.571252 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 00:52:42.598360 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (457) May 15 00:52:42.601595 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 00:52:42.605417 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 00:52:42.605497 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 00:52:42.610250 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:52:42.612030 systemd[1]: Starting disk-uuid.service... May 15 00:52:42.621434 disk-uuid[539]: Primary Header is updated. May 15 00:52:42.621434 disk-uuid[539]: Secondary Entries is updated. May 15 00:52:42.621434 disk-uuid[539]: Secondary Header is updated. May 15 00:52:42.625970 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:52:42.628965 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:52:42.866225 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 00:52:42.866280 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 00:52:42.866289 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 00:52:42.866298 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 00:52:42.867974 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 00:52:42.869057 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 00:52:42.869071 kernel: ata3.00: applying bridge limits May 15 00:52:42.869967 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 00:52:42.870977 kernel: ata3.00: configured for UDMA/100 May 15 00:52:42.871976 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 00:52:42.899976 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 00:52:42.917485 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 00:52:42.917497 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 00:52:43.629563 disk-uuid[540]: The operation has completed successfully. May 15 00:52:43.630893 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:52:43.650833 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 00:52:43.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.650933 systemd[1]: Finished disk-uuid.service. May 15 00:52:43.662088 systemd[1]: Starting verity-setup.service... May 15 00:52:43.673970 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 00:52:43.692827 systemd[1]: Found device dev-mapper-usr.device. May 15 00:52:43.695737 systemd[1]: Mounting sysusr-usr.mount... May 15 00:52:43.697588 systemd[1]: Finished verity-setup.service. May 15 00:52:43.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.756700 systemd[1]: Mounted sysusr-usr.mount. May 15 00:52:43.758080 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 00:52:43.756871 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 00:52:43.758116 systemd[1]: Starting ignition-setup.service... May 15 00:52:43.760602 systemd[1]: Starting parse-ip-for-networkd.service... May 15 00:52:43.770730 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:52:43.770761 kernel: BTRFS info (device vda6): using free space tree May 15 00:52:43.770771 kernel: BTRFS info (device vda6): has skinny extents May 15 00:52:43.779340 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 00:52:43.787041 systemd[1]: Finished ignition-setup.service. May 15 00:52:43.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.788562 systemd[1]: Starting ignition-fetch-offline.service... May 15 00:52:43.824034 ignition[649]: Ignition 2.14.0 May 15 00:52:43.825002 ignition[649]: Stage: fetch-offline May 15 00:52:43.825065 ignition[649]: no configs at "/usr/lib/ignition/base.d" May 15 00:52:43.825074 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:52:43.825180 ignition[649]: parsed url from cmdline: "" May 15 00:52:43.828034 systemd[1]: Finished parse-ip-for-networkd.service. May 15 00:52:43.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.825183 ignition[649]: no config URL provided May 15 00:52:43.830000 audit: BPF prog-id=9 op=LOAD May 15 00:52:43.825188 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" May 15 00:52:43.825193 ignition[649]: no config at "/usr/lib/ignition/user.ign" May 15 00:52:43.831740 systemd[1]: Starting systemd-networkd.service... May 15 00:52:43.825210 ignition[649]: op(1): [started] loading QEMU firmware config module May 15 00:52:43.825215 ignition[649]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 00:52:43.829960 ignition[649]: op(1): [finished] loading QEMU firmware config module May 15 00:52:43.873602 ignition[649]: parsing config with SHA512: e68578fc56b3d0712e1b978c98aaa6a05fb8975f68637f16f2b09df577658de6eb9aeac685be9dee76d480085c49cc353741416e03e0ad8943f5ea301a8d13ef May 15 00:52:43.879484 unknown[649]: fetched base config from "system" May 15 00:52:43.879494 unknown[649]: fetched user config from "qemu" May 15 00:52:43.879969 ignition[649]: fetch-offline: fetch-offline passed May 15 00:52:43.880020 ignition[649]: Ignition finished successfully May 15 00:52:43.883855 systemd[1]: Finished ignition-fetch-offline.service. May 15 00:52:43.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.894169 systemd-networkd[719]: lo: Link UP May 15 00:52:43.894176 systemd-networkd[719]: lo: Gained carrier May 15 00:52:43.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.894542 systemd-networkd[719]: Enumeration completed May 15 00:52:43.894611 systemd[1]: Started systemd-networkd.service. May 15 00:52:43.894727 systemd-networkd[719]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:52:43.895758 systemd-networkd[719]: eth0: Link UP May 15 00:52:43.895761 systemd-networkd[719]: eth0: Gained carrier May 15 00:52:43.896290 systemd[1]: Reached target network.target. May 15 00:52:43.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.907437 ignition[722]: Ignition 2.14.0 May 15 00:52:43.897822 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 00:52:43.907443 ignition[722]: Stage: kargs May 15 00:52:43.911114 iscsid[731]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 00:52:43.911114 iscsid[731]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 15 00:52:43.911114 iscsid[731]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 00:52:43.911114 iscsid[731]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 00:52:43.911114 iscsid[731]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 00:52:43.911114 iscsid[731]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 00:52:43.911114 iscsid[731]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 00:52:43.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.898448 systemd[1]: Starting ignition-kargs.service... May 15 00:52:43.907521 ignition[722]: no configs at "/usr/lib/ignition/base.d" May 15 00:52:43.900097 systemd[1]: Starting iscsiuio.service... May 15 00:52:43.907529 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:52:43.904250 systemd[1]: Started iscsiuio.service. May 15 00:52:43.908471 ignition[722]: kargs: kargs passed May 15 00:52:43.906402 systemd[1]: Starting iscsid.service... May 15 00:52:43.908503 ignition[722]: Ignition finished successfully May 15 00:52:43.911316 systemd[1]: Started iscsid.service. May 15 00:52:43.913023 systemd-networkd[719]: eth0: DHCPv4 address 10.0.0.92/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:52:43.916748 systemd[1]: Finished ignition-kargs.service. May 15 00:52:43.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.932594 systemd[1]: Starting dracut-initqueue.service... May 15 00:52:43.934719 systemd[1]: Starting ignition-disks.service... May 15 00:52:43.941378 ignition[733]: Ignition 2.14.0 May 15 00:52:43.941388 ignition[733]: Stage: disks May 15 00:52:43.941470 ignition[733]: no configs at "/usr/lib/ignition/base.d" May 15 00:52:43.941479 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:52:43.944620 ignition[733]: disks: disks passed May 15 00:52:43.944706 systemd[1]: Finished dracut-initqueue.service. May 15 00:52:43.944659 ignition[733]: Ignition finished successfully May 15 00:52:43.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.947036 systemd[1]: Reached target remote-fs-pre.target. May 15 00:52:43.948458 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:52:43.950002 systemd[1]: Reached target remote-fs.target. May 15 00:52:43.952224 systemd[1]: Starting dracut-pre-mount.service... May 15 00:52:43.953820 systemd[1]: Finished ignition-disks.service. May 15 00:52:43.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.955455 systemd[1]: Reached target initrd-root-device.target. May 15 00:52:43.957318 systemd[1]: Reached target local-fs-pre.target. May 15 00:52:43.958980 systemd[1]: Reached target local-fs.target. May 15 00:52:43.960503 systemd[1]: Reached target sysinit.target. May 15 00:52:43.961994 systemd[1]: Reached target basic.target. May 15 00:52:43.963655 systemd[1]: Finished dracut-pre-mount.service. May 15 00:52:43.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.965852 systemd[1]: Starting systemd-fsck-root.service... May 15 00:52:43.975756 systemd-fsck[753]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 15 00:52:43.980709 systemd[1]: Finished systemd-fsck-root.service. May 15 00:52:43.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:43.983397 systemd[1]: Mounting sysroot.mount... May 15 00:52:43.990684 systemd[1]: Mounted sysroot.mount. May 15 00:52:43.992036 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 00:52:43.992084 systemd[1]: Reached target initrd-root-fs.target. May 15 00:52:43.994448 systemd[1]: Mounting sysroot-usr.mount... May 15 00:52:43.996067 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 00:52:43.996099 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 00:52:43.997422 systemd[1]: Reached target ignition-diskful.target. May 15 00:52:44.001337 systemd[1]: Mounted sysroot-usr.mount. May 15 00:52:44.003366 systemd[1]: Starting initrd-setup-root.service... May 15 00:52:44.007746 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory May 15 00:52:44.010843 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory May 15 00:52:44.014648 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory May 15 00:52:44.018402 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory May 15 00:52:44.043989 systemd[1]: Finished initrd-setup-root.service. May 15 00:52:44.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:44.046290 systemd[1]: Starting ignition-mount.service... May 15 00:52:44.048280 systemd[1]: Starting sysroot-boot.service... May 15 00:52:44.050876 bash[804]: umount: /sysroot/usr/share/oem: not mounted. May 15 00:52:44.057845 ignition[805]: INFO : Ignition 2.14.0 May 15 00:52:44.057845 ignition[805]: INFO : Stage: mount May 15 00:52:44.060215 ignition[805]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:52:44.060215 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:52:44.060215 ignition[805]: INFO : mount: mount passed May 15 00:52:44.060215 ignition[805]: INFO : Ignition finished successfully May 15 00:52:44.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:44.060326 systemd[1]: Finished ignition-mount.service. May 15 00:52:44.067420 systemd[1]: Finished sysroot-boot.service. May 15 00:52:44.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:44.704122 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 00:52:44.709972 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (814) May 15 00:52:44.709998 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:52:44.712612 kernel: BTRFS info (device vda6): using free space tree May 15 00:52:44.712633 kernel: BTRFS info (device vda6): has skinny extents May 15 00:52:44.715603 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 00:52:44.717906 systemd[1]: Starting ignition-files.service... May 15 00:52:44.730506 ignition[834]: INFO : Ignition 2.14.0 May 15 00:52:44.730506 ignition[834]: INFO : Stage: files May 15 00:52:44.732441 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:52:44.732441 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:52:44.732441 ignition[834]: DEBUG : files: compiled without relabeling support, skipping May 15 00:52:44.736308 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 00:52:44.736308 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 00:52:44.736308 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 00:52:44.736308 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 00:52:44.736308 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 00:52:44.736308 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 00:52:44.736308 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 00:52:44.734509 unknown[834]: wrote ssh authorized keys file for user: core May 15 00:52:44.798360 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 00:52:45.068638 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 00:52:45.068638 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 00:52:45.073033 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 00:52:45.073033 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 00:52:45.073033 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 00:52:45.073033 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 00:52:45.073033 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 00:52:45.073033 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 00:52:45.086002 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 15 00:52:45.470990 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 00:52:45.530091 systemd-networkd[719]: eth0: Gained IPv6LL May 15 00:52:45.830668 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 00:52:45.830668 ignition[834]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 00:52:45.834804 ignition[834]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:52:45.858403 ignition[834]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:52:45.860888 ignition[834]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 00:52:45.860888 ignition[834]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 00:52:45.860888 ignition[834]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 00:52:45.860888 ignition[834]: INFO : files: files passed May 15 00:52:45.860888 ignition[834]: INFO : Ignition finished successfully May 15 00:52:45.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.859798 systemd[1]: Finished ignition-files.service. May 15 00:52:45.861686 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 00:52:45.863324 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 00:52:45.876644 initrd-setup-root-after-ignition[859]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 00:52:45.863868 systemd[1]: Starting ignition-quench.service... May 15 00:52:45.879041 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 00:52:45.867173 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 00:52:45.867265 systemd[1]: Finished ignition-quench.service. May 15 00:52:45.868529 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 00:52:45.870166 systemd[1]: Reached target ignition-complete.target. May 15 00:52:45.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.872507 systemd[1]: Starting initrd-parse-etc.service... May 15 00:52:45.883035 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 00:52:45.883112 systemd[1]: Finished initrd-parse-etc.service. May 15 00:52:45.884457 systemd[1]: Reached target initrd-fs.target. May 15 00:52:45.886025 systemd[1]: Reached target initrd.target. May 15 00:52:45.886838 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 00:52:45.887422 systemd[1]: Starting dracut-pre-pivot.service... May 15 00:52:45.896135 systemd[1]: Finished dracut-pre-pivot.service. May 15 00:52:45.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.897504 systemd[1]: Starting initrd-cleanup.service... May 15 00:52:45.904508 systemd[1]: Stopped target nss-lookup.target. May 15 00:52:45.905434 systemd[1]: Stopped target remote-cryptsetup.target. May 15 00:52:45.907079 systemd[1]: Stopped target timers.target. May 15 00:52:45.908684 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 00:52:45.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.908765 systemd[1]: Stopped dracut-pre-pivot.service. May 15 00:52:45.910305 systemd[1]: Stopped target initrd.target. May 15 00:52:45.911960 systemd[1]: Stopped target basic.target. May 15 00:52:45.913485 systemd[1]: Stopped target ignition-complete.target. May 15 00:52:45.915096 systemd[1]: Stopped target ignition-diskful.target. May 15 00:52:45.916677 systemd[1]: Stopped target initrd-root-device.target. May 15 00:52:45.918427 systemd[1]: Stopped target remote-fs.target. May 15 00:52:45.920079 systemd[1]: Stopped target remote-fs-pre.target. May 15 00:52:45.921771 systemd[1]: Stopped target sysinit.target. May 15 00:52:45.923316 systemd[1]: Stopped target local-fs.target. May 15 00:52:45.924894 systemd[1]: Stopped target local-fs-pre.target. May 15 00:52:45.926460 systemd[1]: Stopped target swap.target. May 15 00:52:45.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.927923 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 00:52:45.928022 systemd[1]: Stopped dracut-pre-mount.service. May 15 00:52:45.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.929595 systemd[1]: Stopped target cryptsetup.target. May 15 00:52:45.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.931055 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 00:52:45.931135 systemd[1]: Stopped dracut-initqueue.service. May 15 00:52:45.932895 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 00:52:45.932995 systemd[1]: Stopped ignition-fetch-offline.service. May 15 00:52:45.934560 systemd[1]: Stopped target paths.target. May 15 00:52:45.936030 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 00:52:45.940990 systemd[1]: Stopped systemd-ask-password-console.path. May 15 00:52:45.943022 systemd[1]: Stopped target slices.target. May 15 00:52:45.944635 systemd[1]: Stopped target sockets.target. May 15 00:52:45.946159 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 00:52:45.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.946246 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 00:52:45.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.947927 systemd[1]: ignition-files.service: Deactivated successfully. May 15 00:52:45.952571 iscsid[731]: iscsid shutting down. May 15 00:52:45.948018 systemd[1]: Stopped ignition-files.service. May 15 00:52:45.950598 systemd[1]: Stopping ignition-mount.service... May 15 00:52:45.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.952940 systemd[1]: Stopping iscsid.service... May 15 00:52:45.958891 ignition[875]: INFO : Ignition 2.14.0 May 15 00:52:45.958891 ignition[875]: INFO : Stage: umount May 15 00:52:45.958891 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:52:45.958891 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:52:45.958891 ignition[875]: INFO : umount: umount passed May 15 00:52:45.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.954013 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 00:52:45.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.969384 ignition[875]: INFO : Ignition finished successfully May 15 00:52:45.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.954114 systemd[1]: Stopped kmod-static-nodes.service. May 15 00:52:45.956247 systemd[1]: Stopping sysroot-boot.service... May 15 00:52:45.957082 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 00:52:45.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.957190 systemd[1]: Stopped systemd-udev-trigger.service. May 15 00:52:45.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.959060 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 00:52:45.959174 systemd[1]: Stopped dracut-pre-trigger.service. May 15 00:52:45.962058 systemd[1]: iscsid.service: Deactivated successfully. May 15 00:52:45.962134 systemd[1]: Stopped iscsid.service. May 15 00:52:45.963444 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 00:52:45.963508 systemd[1]: Stopped ignition-mount.service. May 15 00:52:45.965465 systemd[1]: iscsid.socket: Deactivated successfully. May 15 00:52:45.965528 systemd[1]: Closed iscsid.socket. May 15 00:52:45.966653 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 00:52:45.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.966683 systemd[1]: Stopped ignition-disks.service. May 15 00:52:45.967550 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 00:52:45.967577 systemd[1]: Stopped ignition-kargs.service. May 15 00:52:45.993000 audit: BPF prog-id=6 op=UNLOAD May 15 00:52:45.969333 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 00:52:45.969361 systemd[1]: Stopped ignition-setup.service. May 15 00:52:45.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.970391 systemd[1]: Stopping iscsiuio.service... May 15 00:52:45.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:46.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.972885 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 00:52:45.973244 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 00:52:45.973317 systemd[1]: Stopped iscsiuio.service. May 15 00:52:45.975075 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 00:52:45.975135 systemd[1]: Finished initrd-cleanup.service. May 15 00:52:45.977756 systemd[1]: Stopped target network.target. May 15 00:52:46.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.978794 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 00:52:45.978819 systemd[1]: Closed iscsiuio.socket. May 15 00:52:45.978962 systemd[1]: Stopping systemd-networkd.service... May 15 00:52:45.979105 systemd[1]: Stopping systemd-resolved.service... May 15 00:52:45.986987 systemd-networkd[719]: eth0: DHCPv6 lease lost May 15 00:52:46.011000 audit: BPF prog-id=9 op=UNLOAD May 15 00:52:45.987838 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 00:52:46.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.987942 systemd[1]: Stopped systemd-networkd.service. May 15 00:52:45.989357 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 00:52:45.989433 systemd[1]: Stopped systemd-resolved.service. May 15 00:52:45.993407 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 00:52:46.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.993431 systemd[1]: Closed systemd-networkd.socket. May 15 00:52:46.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:46.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.995347 systemd[1]: Stopping network-cleanup.service... May 15 00:52:45.996557 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 00:52:46.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.996594 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 00:52:45.998258 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 00:52:45.998287 systemd[1]: Stopped systemd-sysctl.service. May 15 00:52:46.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:46.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:45.999200 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 00:52:45.999231 systemd[1]: Stopped systemd-modules-load.service. May 15 00:52:46.000777 systemd[1]: Stopping systemd-udevd.service... May 15 00:52:46.002250 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 00:52:46.005421 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 00:52:46.005491 systemd[1]: Stopped network-cleanup.service. May 15 00:52:46.011435 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 00:52:46.011563 systemd[1]: Stopped systemd-udevd.service. May 15 00:52:46.014162 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 00:52:46.014200 systemd[1]: Closed systemd-udevd-control.socket. May 15 00:52:46.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:46.015731 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 00:52:46.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:46.015757 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 00:52:46.017636 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 00:52:46.017669 systemd[1]: Stopped dracut-pre-udev.service. May 15 00:52:46.019300 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 00:52:46.019342 systemd[1]: Stopped dracut-cmdline.service. May 15 00:52:46.021050 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 00:52:46.021092 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 00:52:46.023478 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 00:52:46.024338 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 00:52:46.024374 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 00:52:46.028072 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 00:52:46.028136 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 00:52:46.037982 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 00:52:46.038052 systemd[1]: Stopped sysroot-boot.service. May 15 00:52:46.039526 systemd[1]: Reached target initrd-switch-root.target. May 15 00:52:46.041112 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 00:52:46.041148 systemd[1]: Stopped initrd-setup-root.service. May 15 00:52:46.041746 systemd[1]: Starting initrd-switch-root.service... May 15 00:52:46.058296 systemd[1]: Switching root. May 15 00:52:46.078581 systemd-journald[197]: Journal stopped May 15 00:52:48.601486 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 15 00:52:48.601531 kernel: SELinux: Class mctp_socket not defined in policy. May 15 00:52:48.601545 kernel: SELinux: Class anon_inode not defined in policy. May 15 00:52:48.601555 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 00:52:48.601564 kernel: SELinux: policy capability network_peer_controls=1 May 15 00:52:48.601574 kernel: SELinux: policy capability open_perms=1 May 15 00:52:48.601584 kernel: SELinux: policy capability extended_socket_class=1 May 15 00:52:48.601593 kernel: SELinux: policy capability always_check_network=0 May 15 00:52:48.601604 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 00:52:48.601617 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 00:52:48.601626 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 00:52:48.601635 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 00:52:48.601649 systemd[1]: Successfully loaded SELinux policy in 39.077ms. May 15 00:52:48.601664 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.475ms. May 15 00:52:48.601678 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:52:48.601688 systemd[1]: Detected virtualization kvm. May 15 00:52:48.601698 systemd[1]: Detected architecture x86-64. May 15 00:52:48.601709 systemd[1]: Detected first boot. May 15 00:52:48.601722 systemd[1]: Initializing machine ID from VM UUID. May 15 00:52:48.601735 kernel: kauditd_printk_skb: 66 callbacks suppressed May 15 00:52:48.601746 kernel: audit: type=1400 audit(1747270366.398:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:52:48.601756 kernel: audit: type=1400 audit(1747270366.398:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:52:48.601766 kernel: audit: type=1334 audit(1747270366.402:79): prog-id=10 op=LOAD May 15 00:52:48.601775 kernel: audit: type=1334 audit(1747270366.402:80): prog-id=10 op=UNLOAD May 15 00:52:48.601786 kernel: audit: type=1334 audit(1747270366.406:81): prog-id=11 op=LOAD May 15 00:52:48.601795 kernel: audit: type=1334 audit(1747270366.406:82): prog-id=11 op=UNLOAD May 15 00:52:48.601805 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 00:52:48.601816 kernel: audit: type=1400 audit(1747270366.437:83): avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:52:48.601827 kernel: audit: type=1300 audit(1747270366.437:83): arch=c000003e syscall=188 success=yes exit=0 a0=c0001c58a2 a1=c000146de0 a2=c00014f0c0 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:48.601837 kernel: audit: type=1327 audit(1747270366.437:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:52:48.601846 kernel: audit: type=1400 audit(1747270366.440:84): avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:52:48.601858 systemd[1]: Populated /etc with preset unit settings. May 15 00:52:48.601879 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:52:48.601890 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:52:48.601902 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:52:48.601913 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 00:52:48.601924 systemd[1]: Stopped initrd-switch-root.service. May 15 00:52:48.601934 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 00:52:48.601944 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 00:52:48.601981 systemd[1]: Created slice system-addon\x2drun.slice. May 15 00:52:48.601991 systemd[1]: Created slice system-getty.slice. May 15 00:52:48.602003 systemd[1]: Created slice system-modprobe.slice. May 15 00:52:48.602013 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 00:52:48.602023 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 00:52:48.602033 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 00:52:48.602044 systemd[1]: Created slice user.slice. May 15 00:52:48.602053 systemd[1]: Started systemd-ask-password-console.path. May 15 00:52:48.602065 systemd[1]: Started systemd-ask-password-wall.path. May 15 00:52:48.602075 systemd[1]: Set up automount boot.automount. May 15 00:52:48.602085 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 00:52:48.602096 systemd[1]: Stopped target initrd-switch-root.target. May 15 00:52:48.602106 systemd[1]: Stopped target initrd-fs.target. May 15 00:52:48.602116 systemd[1]: Stopped target initrd-root-fs.target. May 15 00:52:48.602126 systemd[1]: Reached target integritysetup.target. May 15 00:52:48.602136 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:52:48.602146 systemd[1]: Reached target remote-fs.target. May 15 00:52:48.602156 systemd[1]: Reached target slices.target. May 15 00:52:48.602166 systemd[1]: Reached target swap.target. May 15 00:52:48.602176 systemd[1]: Reached target torcx.target. May 15 00:52:48.602186 systemd[1]: Reached target veritysetup.target. May 15 00:52:48.602197 systemd[1]: Listening on systemd-coredump.socket. May 15 00:52:48.602207 systemd[1]: Listening on systemd-initctl.socket. May 15 00:52:48.602217 systemd[1]: Listening on systemd-networkd.socket. May 15 00:52:48.602236 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:52:48.602247 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:52:48.602257 systemd[1]: Listening on systemd-userdbd.socket. May 15 00:52:48.602267 systemd[1]: Mounting dev-hugepages.mount... May 15 00:52:48.602277 systemd[1]: Mounting dev-mqueue.mount... May 15 00:52:48.602288 systemd[1]: Mounting media.mount... May 15 00:52:48.602299 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:48.602310 systemd[1]: Mounting sys-kernel-debug.mount... May 15 00:52:48.602320 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 00:52:48.602330 systemd[1]: Mounting tmp.mount... May 15 00:52:48.602340 systemd[1]: Starting flatcar-tmpfiles.service... May 15 00:52:48.602350 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:52:48.602360 systemd[1]: Starting kmod-static-nodes.service... May 15 00:52:48.602370 systemd[1]: Starting modprobe@configfs.service... May 15 00:52:48.602380 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:52:48.602392 systemd[1]: Starting modprobe@drm.service... May 15 00:52:48.602402 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:52:48.602412 systemd[1]: Starting modprobe@fuse.service... May 15 00:52:48.602422 systemd[1]: Starting modprobe@loop.service... May 15 00:52:48.602432 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 00:52:48.602442 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 00:52:48.602452 systemd[1]: Stopped systemd-fsck-root.service. May 15 00:52:48.602462 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 00:52:48.602472 kernel: fuse: init (API version 7.34) May 15 00:52:48.602484 systemd[1]: Stopped systemd-fsck-usr.service. May 15 00:52:48.602494 systemd[1]: Stopped systemd-journald.service. May 15 00:52:48.602505 systemd[1]: Starting systemd-journald.service... May 15 00:52:48.602515 systemd[1]: Starting systemd-modules-load.service... May 15 00:52:48.602525 systemd[1]: Starting systemd-network-generator.service... May 15 00:52:48.602535 systemd[1]: Starting systemd-remount-fs.service... May 15 00:52:48.602544 kernel: loop: module loaded May 15 00:52:48.602554 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:52:48.602564 systemd[1]: verity-setup.service: Deactivated successfully. May 15 00:52:48.602575 systemd[1]: Stopped verity-setup.service. May 15 00:52:48.602585 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:48.602597 systemd-journald[994]: Journal started May 15 00:52:48.602634 systemd-journald[994]: Runtime Journal (/run/log/journal/e235b65e74594c6d8a587b43233e1aa4) is 6.0M, max 48.5M, 42.5M free. May 15 00:52:46.135000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 00:52:46.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:52:46.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:52:46.402000 audit: BPF prog-id=10 op=LOAD May 15 00:52:46.402000 audit: BPF prog-id=10 op=UNLOAD May 15 00:52:46.406000 audit: BPF prog-id=11 op=LOAD May 15 00:52:46.406000 audit: BPF prog-id=11 op=UNLOAD May 15 00:52:46.437000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:52:46.437000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001c58a2 a1=c000146de0 a2=c00014f0c0 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:46.437000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:52:46.440000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:52:46.440000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001c5979 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:46.440000 audit: CWD cwd="/" May 15 00:52:46.440000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:46.440000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:46.440000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:52:48.462000 audit: BPF prog-id=12 op=LOAD May 15 00:52:48.462000 audit: BPF prog-id=3 op=UNLOAD May 15 00:52:48.462000 audit: BPF prog-id=13 op=LOAD May 15 00:52:48.462000 audit: BPF prog-id=14 op=LOAD May 15 00:52:48.462000 audit: BPF prog-id=4 op=UNLOAD May 15 00:52:48.462000 audit: BPF prog-id=5 op=UNLOAD May 15 00:52:48.463000 audit: BPF prog-id=15 op=LOAD May 15 00:52:48.463000 audit: BPF prog-id=12 op=UNLOAD May 15 00:52:48.463000 audit: BPF prog-id=16 op=LOAD May 15 00:52:48.463000 audit: BPF prog-id=17 op=LOAD May 15 00:52:48.463000 audit: BPF prog-id=13 op=UNLOAD May 15 00:52:48.463000 audit: BPF prog-id=14 op=UNLOAD May 15 00:52:48.464000 audit: BPF prog-id=18 op=LOAD May 15 00:52:48.464000 audit: BPF prog-id=15 op=UNLOAD May 15 00:52:48.464000 audit: BPF prog-id=19 op=LOAD May 15 00:52:48.464000 audit: BPF prog-id=20 op=LOAD May 15 00:52:48.464000 audit: BPF prog-id=16 op=UNLOAD May 15 00:52:48.464000 audit: BPF prog-id=17 op=UNLOAD May 15 00:52:48.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.480000 audit: BPF prog-id=18 op=UNLOAD May 15 00:52:48.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.581000 audit: BPF prog-id=21 op=LOAD May 15 00:52:48.581000 audit: BPF prog-id=22 op=LOAD May 15 00:52:48.581000 audit: BPF prog-id=23 op=LOAD May 15 00:52:48.581000 audit: BPF prog-id=19 op=UNLOAD May 15 00:52:48.581000 audit: BPF prog-id=20 op=UNLOAD May 15 00:52:48.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.599000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 00:52:48.599000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff3a71d3a0 a2=4000 a3=7fff3a71d43c items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:48.599000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 00:52:48.461585 systemd[1]: Queued start job for default target multi-user.target. May 15 00:52:46.437656 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:52:48.461597 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 00:52:46.437852 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:52:48.465472 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 00:52:46.437868 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:52:46.437895 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 00:52:46.437904 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 00:52:46.437931 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 00:52:46.437943 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 00:52:46.438126 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 00:52:46.438160 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:52:46.438173 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:52:46.438471 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 00:52:46.438502 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 00:52:46.438518 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 00:52:46.438533 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 00:52:46.438548 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 00:52:46.438562 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 00:52:48.605072 systemd[1]: Started systemd-journald.service. May 15 00:52:48.212580 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:52:48.212826 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:52:48.212927 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:52:48.213103 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:52:48.213148 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 00:52:48.213198 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-15T00:52:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 00:52:48.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.606054 systemd[1]: Mounted dev-hugepages.mount. May 15 00:52:48.607013 systemd[1]: Mounted dev-mqueue.mount. May 15 00:52:48.607917 systemd[1]: Mounted media.mount. May 15 00:52:48.608770 systemd[1]: Mounted sys-kernel-debug.mount. May 15 00:52:48.609734 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 00:52:48.610611 systemd[1]: Mounted tmp.mount. May 15 00:52:48.611607 systemd[1]: Finished flatcar-tmpfiles.service. May 15 00:52:48.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.612795 systemd[1]: Finished kmod-static-nodes.service. May 15 00:52:48.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.613853 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 00:52:48.614114 systemd[1]: Finished modprobe@configfs.service. May 15 00:52:48.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.615192 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:52:48.615414 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:52:48.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.616456 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:52:48.616642 systemd[1]: Finished modprobe@drm.service. May 15 00:52:48.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.617601 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:52:48.617756 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:52:48.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.618770 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 00:52:48.618900 systemd[1]: Finished modprobe@fuse.service. May 15 00:52:48.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.619847 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:52:48.620092 systemd[1]: Finished modprobe@loop.service. May 15 00:52:48.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.621133 systemd[1]: Finished systemd-modules-load.service. May 15 00:52:48.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.622231 systemd[1]: Finished systemd-network-generator.service. May 15 00:52:48.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.623370 systemd[1]: Finished systemd-remount-fs.service. May 15 00:52:48.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.624563 systemd[1]: Reached target network-pre.target. May 15 00:52:48.626645 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 00:52:48.628299 systemd[1]: Mounting sys-kernel-config.mount... May 15 00:52:48.629060 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 00:52:48.630194 systemd[1]: Starting systemd-hwdb-update.service... May 15 00:52:48.631735 systemd[1]: Starting systemd-journal-flush.service... May 15 00:52:48.632558 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:52:48.633347 systemd[1]: Starting systemd-random-seed.service... May 15 00:52:48.634168 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:52:48.634902 systemd[1]: Starting systemd-sysctl.service... May 15 00:52:48.637894 systemd[1]: Starting systemd-sysusers.service... May 15 00:52:48.640988 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 00:52:48.641231 systemd-journald[994]: Time spent on flushing to /var/log/journal/e235b65e74594c6d8a587b43233e1aa4 is 15.691ms for 1105 entries. May 15 00:52:48.641231 systemd-journald[994]: System Journal (/var/log/journal/e235b65e74594c6d8a587b43233e1aa4) is 8.0M, max 195.6M, 187.6M free. May 15 00:52:48.673972 systemd-journald[994]: Received client request to flush runtime journal. May 15 00:52:48.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:48.643337 systemd[1]: Mounted sys-kernel-config.mount. May 15 00:52:48.645418 systemd[1]: Finished systemd-random-seed.service. May 15 00:52:48.674441 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 00:52:48.646663 systemd[1]: Reached target first-boot-complete.target. May 15 00:52:48.648208 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:52:48.650574 systemd[1]: Starting systemd-udev-settle.service... May 15 00:52:48.656566 systemd[1]: Finished systemd-sysctl.service. May 15 00:52:48.657759 systemd[1]: Finished systemd-sysusers.service. May 15 00:52:48.674918 systemd[1]: Finished systemd-journal-flush.service. May 15 00:52:48.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.167182 systemd[1]: Finished systemd-hwdb-update.service. May 15 00:52:49.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.167000 audit: BPF prog-id=24 op=LOAD May 15 00:52:49.167000 audit: BPF prog-id=25 op=LOAD May 15 00:52:49.167000 audit: BPF prog-id=7 op=UNLOAD May 15 00:52:49.167000 audit: BPF prog-id=8 op=UNLOAD May 15 00:52:49.169474 systemd[1]: Starting systemd-udevd.service... May 15 00:52:49.184303 systemd-udevd[1015]: Using default interface naming scheme 'v252'. May 15 00:52:49.196120 systemd[1]: Started systemd-udevd.service. May 15 00:52:49.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.197000 audit: BPF prog-id=26 op=LOAD May 15 00:52:49.200693 systemd[1]: Starting systemd-networkd.service... May 15 00:52:49.205000 audit: BPF prog-id=27 op=LOAD May 15 00:52:49.205000 audit: BPF prog-id=28 op=LOAD May 15 00:52:49.205000 audit: BPF prog-id=29 op=LOAD May 15 00:52:49.207352 systemd[1]: Starting systemd-userdbd.service... May 15 00:52:49.227411 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 00:52:49.233265 systemd[1]: Started systemd-userdbd.service. May 15 00:52:49.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.242719 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:52:49.261971 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 00:52:49.273984 kernel: ACPI: button: Power Button [PWRF] May 15 00:52:49.271000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 00:52:49.282307 systemd-networkd[1026]: lo: Link UP May 15 00:52:49.282546 systemd-networkd[1026]: lo: Gained carrier May 15 00:52:49.282960 systemd-networkd[1026]: Enumeration completed May 15 00:52:49.283034 systemd[1]: Started systemd-networkd.service. May 15 00:52:49.283054 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:52:49.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.284327 systemd-networkd[1026]: eth0: Link UP May 15 00:52:49.284410 systemd-networkd[1026]: eth0: Gained carrier May 15 00:52:49.271000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5570326e4650 a1=338ac a2=7fcacd565bc5 a3=5 items=110 ppid=1015 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:49.271000 audit: CWD cwd="/" May 15 00:52:49.271000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=1 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=2 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=3 name=(null) inode=13093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=4 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=5 name=(null) inode=13094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=6 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=7 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=8 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=9 name=(null) inode=13096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=10 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=11 name=(null) inode=13097 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=12 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=13 name=(null) inode=13098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=14 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=15 name=(null) inode=13099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=16 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=17 name=(null) inode=13100 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=18 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=19 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=20 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=21 name=(null) inode=13102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=22 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=23 name=(null) inode=13103 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=24 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=25 name=(null) inode=13104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=26 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=27 name=(null) inode=13105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=28 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=29 name=(null) inode=13106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=30 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=31 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=32 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=33 name=(null) inode=13108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=34 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=35 name=(null) inode=13109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=36 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=37 name=(null) inode=13110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=38 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=39 name=(null) inode=13111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=40 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=41 name=(null) inode=13112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=42 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=43 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=44 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=45 name=(null) inode=13114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=46 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=47 name=(null) inode=13115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=48 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=49 name=(null) inode=13116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=50 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=51 name=(null) inode=13117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=52 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=53 name=(null) inode=13118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=55 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=56 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=57 name=(null) inode=13120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=58 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=59 name=(null) inode=13121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=60 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=61 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=62 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=63 name=(null) inode=13123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=64 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=65 name=(null) inode=13124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=66 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=67 name=(null) inode=13125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=68 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=69 name=(null) inode=13126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=70 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=71 name=(null) inode=13127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=72 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=73 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=74 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=75 name=(null) inode=13129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=76 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=77 name=(null) inode=13130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=78 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=79 name=(null) inode=13131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=80 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=81 name=(null) inode=13132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=82 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=83 name=(null) inode=13133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=84 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=85 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=86 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=87 name=(null) inode=13135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=88 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=89 name=(null) inode=13136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=90 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=91 name=(null) inode=13137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=92 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=93 name=(null) inode=13138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=94 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=95 name=(null) inode=13139 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=96 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=97 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=98 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=99 name=(null) inode=13141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=100 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=101 name=(null) inode=13142 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=102 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=103 name=(null) inode=13143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=104 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=105 name=(null) inode=13144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=106 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=107 name=(null) inode=13145 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PATH item=109 name=(null) inode=13146 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:52:49.271000 audit: PROCTITLE proctitle="(udev-worker)" May 15 00:52:49.299975 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 00:52:49.300282 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 00:52:49.300397 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 00:52:49.305983 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 00:52:49.308071 systemd-networkd[1026]: eth0: DHCPv4 address 10.0.0.92/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:52:49.340971 kernel: mousedev: PS/2 mouse device common for all mice May 15 00:52:49.376500 kernel: kvm: Nested Virtualization enabled May 15 00:52:49.376556 kernel: SVM: kvm: Nested Paging enabled May 15 00:52:49.376570 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 00:52:49.377172 kernel: SVM: Virtual GIF supported May 15 00:52:49.392983 kernel: EDAC MC: Ver: 3.0.0 May 15 00:52:49.421332 systemd[1]: Finished systemd-udev-settle.service. May 15 00:52:49.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.423271 systemd[1]: Starting lvm2-activation-early.service... May 15 00:52:49.430922 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:52:49.455651 systemd[1]: Finished lvm2-activation-early.service. May 15 00:52:49.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.456678 systemd[1]: Reached target cryptsetup.target. May 15 00:52:49.458530 systemd[1]: Starting lvm2-activation.service... May 15 00:52:49.462351 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:52:49.485540 systemd[1]: Finished lvm2-activation.service. May 15 00:52:49.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.486459 systemd[1]: Reached target local-fs-pre.target. May 15 00:52:49.487309 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 00:52:49.487325 systemd[1]: Reached target local-fs.target. May 15 00:52:49.488110 systemd[1]: Reached target machines.target. May 15 00:52:49.489738 systemd[1]: Starting ldconfig.service... May 15 00:52:49.490662 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:52:49.490707 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:49.491517 systemd[1]: Starting systemd-boot-update.service... May 15 00:52:49.493107 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 00:52:49.495395 systemd[1]: Starting systemd-machine-id-commit.service... May 15 00:52:49.497548 systemd[1]: Starting systemd-sysext.service... May 15 00:52:49.498723 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) May 15 00:52:49.499590 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 00:52:49.502670 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 00:52:49.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.513540 systemd[1]: Unmounting usr-share-oem.mount... May 15 00:52:49.517714 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 00:52:49.517892 systemd[1]: Unmounted usr-share-oem.mount. May 15 00:52:49.527969 kernel: loop0: detected capacity change from 0 to 205544 May 15 00:52:49.534518 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) May 15 00:52:49.534518 systemd-fsck[1060]: /dev/vda1: 790 files, 120690/258078 clusters May 15 00:52:49.535959 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 00:52:49.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.539050 systemd[1]: Mounting boot.mount... May 15 00:52:49.551089 systemd[1]: Mounted boot.mount. May 15 00:52:49.732461 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 00:52:49.733540 systemd[1]: Finished systemd-machine-id-commit.service. May 15 00:52:49.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.736090 systemd[1]: Finished systemd-boot-update.service. May 15 00:52:49.737119 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 00:52:49.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.752966 kernel: loop1: detected capacity change from 0 to 205544 May 15 00:52:49.756459 (sd-sysext)[1066]: Using extensions 'kubernetes'. May 15 00:52:49.756865 (sd-sysext)[1066]: Merged extensions into '/usr'. May 15 00:52:49.770909 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:49.772078 systemd[1]: Mounting usr-share-oem.mount... May 15 00:52:49.772917 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:52:49.773964 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:52:49.776451 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:52:49.778579 systemd[1]: Starting modprobe@loop.service... May 15 00:52:49.779499 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:52:49.779632 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:49.779744 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:49.781942 systemd[1]: Mounted usr-share-oem.mount. May 15 00:52:49.783108 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:52:49.783215 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:52:49.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.784746 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:52:49.784898 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:52:49.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.786277 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:52:49.786416 systemd[1]: Finished modprobe@loop.service. May 15 00:52:49.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.787877 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:52:49.788035 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:52:49.789335 systemd[1]: Finished systemd-sysext.service. May 15 00:52:49.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.791336 systemd[1]: Starting ensure-sysext.service... May 15 00:52:49.792433 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 00:52:49.792966 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 00:52:49.797447 systemd[1]: Reloading. May 15 00:52:49.805380 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 00:52:49.806900 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 00:52:49.809386 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 00:52:49.850679 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-15T00:52:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:52:49.851083 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-15T00:52:49Z" level=info msg="torcx already run" May 15 00:52:49.900047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:52:49.900063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:52:49.916833 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:52:49.969000 audit: BPF prog-id=30 op=LOAD May 15 00:52:49.969000 audit: BPF prog-id=31 op=LOAD May 15 00:52:49.969000 audit: BPF prog-id=24 op=UNLOAD May 15 00:52:49.969000 audit: BPF prog-id=25 op=UNLOAD May 15 00:52:49.971000 audit: BPF prog-id=32 op=LOAD May 15 00:52:49.971000 audit: BPF prog-id=27 op=UNLOAD May 15 00:52:49.971000 audit: BPF prog-id=33 op=LOAD May 15 00:52:49.971000 audit: BPF prog-id=34 op=LOAD May 15 00:52:49.971000 audit: BPF prog-id=28 op=UNLOAD May 15 00:52:49.971000 audit: BPF prog-id=29 op=UNLOAD May 15 00:52:49.972000 audit: BPF prog-id=35 op=LOAD May 15 00:52:49.972000 audit: BPF prog-id=21 op=UNLOAD May 15 00:52:49.973000 audit: BPF prog-id=36 op=LOAD May 15 00:52:49.973000 audit: BPF prog-id=37 op=LOAD May 15 00:52:49.973000 audit: BPF prog-id=22 op=UNLOAD May 15 00:52:49.973000 audit: BPF prog-id=23 op=UNLOAD May 15 00:52:49.974000 audit: BPF prog-id=38 op=LOAD May 15 00:52:49.974000 audit: BPF prog-id=26 op=UNLOAD May 15 00:52:49.977206 systemd[1]: Finished ldconfig.service. May 15 00:52:49.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.979026 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 00:52:49.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.982651 systemd[1]: Starting audit-rules.service... May 15 00:52:49.984357 systemd[1]: Starting clean-ca-certificates.service... May 15 00:52:49.986256 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 00:52:49.987000 audit: BPF prog-id=39 op=LOAD May 15 00:52:49.988769 systemd[1]: Starting systemd-resolved.service... May 15 00:52:49.989000 audit: BPF prog-id=40 op=LOAD May 15 00:52:49.990830 systemd[1]: Starting systemd-timesyncd.service... May 15 00:52:49.992613 systemd[1]: Starting systemd-update-utmp.service... May 15 00:52:49.993972 systemd[1]: Finished clean-ca-certificates.service. May 15 00:52:49.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:49.996729 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:52:49.996000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 00:52:50.000881 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:50.001129 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:52:50.002370 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:52:50.004043 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:52:50.005899 systemd[1]: Starting modprobe@loop.service... May 15 00:52:50.006755 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:52:50.006894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:50.007040 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:52:50.007149 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:50.008472 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 00:52:50.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.009890 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:52:50.010019 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:52:50.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.011311 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:52:50.011410 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:52:50.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.012695 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:52:50.012784 systemd[1]: Finished modprobe@loop.service. May 15 00:52:50.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.014159 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:52:50.014307 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:52:50.015307 systemd[1]: Starting systemd-update-done.service... May 15 00:52:50.017679 systemd[1]: Finished systemd-update-utmp.service. May 15 00:52:50.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.019302 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:50.019466 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:52:50.020405 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:52:50.021849 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:52:50.023400 systemd[1]: Starting modprobe@loop.service... May 15 00:52:50.024130 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:52:50.024237 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:50.024325 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:52:50.024389 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:50.025109 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:52:50.025209 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:52:50.026551 systemd[1]: Finished systemd-update-done.service. May 15 00:52:50.027799 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:52:50.027917 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:52:50.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.029290 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:52:50.029401 systemd[1]: Finished modprobe@loop.service. May 15 00:52:50.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:50.030717 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:52:50.030803 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:52:50.033125 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:50.033331 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:52:50.034291 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:52:50.036202 systemd[1]: Starting modprobe@drm.service... May 15 00:52:50.036000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 00:52:50.036000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda9717f60 a2=420 a3=0 items=0 ppid=1135 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:50.036000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 00:52:50.037340 augenrules[1162]: No rules May 15 00:52:50.038474 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:52:50.040167 systemd[1]: Starting modprobe@loop.service... May 15 00:52:50.040967 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:52:50.041070 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:50.042137 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 00:52:50.043055 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:52:50.043156 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:52:50.044595 systemd[1]: Finished audit-rules.service. May 15 00:52:50.045765 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:52:50.045902 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:52:50.047124 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:52:50.047241 systemd[1]: Finished modprobe@drm.service. May 15 00:52:50.048384 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:52:50.048510 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:52:50.049871 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:52:50.050025 systemd[1]: Finished modprobe@loop.service. May 15 00:52:50.051364 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:52:50.051452 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:52:50.052514 systemd[1]: Finished ensure-sysext.service. May 15 00:52:50.057914 systemd[1]: Started systemd-timesyncd.service. May 15 00:52:51.150110 systemd-timesyncd[1142]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 00:52:51.150159 systemd-timesyncd[1142]: Initial clock synchronization to Thu 2025-05-15 00:52:51.150051 UTC. May 15 00:52:51.150212 systemd[1]: Reached target time-set.target. May 15 00:52:51.152331 systemd-resolved[1141]: Positive Trust Anchors: May 15 00:52:51.152347 systemd-resolved[1141]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:52:51.152374 systemd-resolved[1141]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:52:51.159034 systemd-resolved[1141]: Defaulting to hostname 'linux'. May 15 00:52:51.160387 systemd[1]: Started systemd-resolved.service. May 15 00:52:51.161320 systemd[1]: Reached target network.target. May 15 00:52:51.162160 systemd[1]: Reached target nss-lookup.target. May 15 00:52:51.163030 systemd[1]: Reached target sysinit.target. May 15 00:52:51.163923 systemd[1]: Started motdgen.path. May 15 00:52:51.164681 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 00:52:51.165955 systemd[1]: Started logrotate.timer. May 15 00:52:51.166800 systemd[1]: Started mdadm.timer. May 15 00:52:51.167550 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 00:52:51.168464 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 00:52:51.168484 systemd[1]: Reached target paths.target. May 15 00:52:51.169302 systemd[1]: Reached target timers.target. May 15 00:52:51.170374 systemd[1]: Listening on dbus.socket. May 15 00:52:51.172079 systemd[1]: Starting docker.socket... May 15 00:52:51.174738 systemd[1]: Listening on sshd.socket. May 15 00:52:51.175635 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:51.175979 systemd[1]: Listening on docker.socket. May 15 00:52:51.176831 systemd[1]: Reached target sockets.target. May 15 00:52:51.177665 systemd[1]: Reached target basic.target. May 15 00:52:51.178508 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:52:51.178530 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:52:51.179349 systemd[1]: Starting containerd.service... May 15 00:52:51.181007 systemd[1]: Starting dbus.service... May 15 00:52:51.182591 systemd[1]: Starting enable-oem-cloudinit.service... May 15 00:52:51.184364 systemd[1]: Starting extend-filesystems.service... May 15 00:52:51.185364 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 00:52:51.186582 jq[1178]: false May 15 00:52:51.186243 systemd[1]: Starting motdgen.service... May 15 00:52:51.187880 systemd[1]: Starting prepare-helm.service... May 15 00:52:51.190729 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 00:52:51.192537 systemd[1]: Starting sshd-keygen.service... May 15 00:52:51.194277 extend-filesystems[1179]: Found loop1 May 15 00:52:51.194277 extend-filesystems[1179]: Found sr0 May 15 00:52:51.194277 extend-filesystems[1179]: Found vda May 15 00:52:51.194277 extend-filesystems[1179]: Found vda1 May 15 00:52:51.194277 extend-filesystems[1179]: Found vda2 May 15 00:52:51.194277 extend-filesystems[1179]: Found vda3 May 15 00:52:51.194277 extend-filesystems[1179]: Found usr May 15 00:52:51.194277 extend-filesystems[1179]: Found vda4 May 15 00:52:51.198694 extend-filesystems[1179]: Found vda6 May 15 00:52:51.198694 extend-filesystems[1179]: Found vda7 May 15 00:52:51.198694 extend-filesystems[1179]: Found vda9 May 15 00:52:51.198694 extend-filesystems[1179]: Checking size of /dev/vda9 May 15 00:52:51.197882 systemd[1]: Starting systemd-logind.service... May 15 00:52:51.204735 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:52:51.204791 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 00:52:51.205105 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 00:52:51.205342 dbus-daemon[1177]: [system] SELinux support is enabled May 15 00:52:51.206260 systemd[1]: Starting update-engine.service... May 15 00:52:51.207967 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 00:52:51.209457 systemd[1]: Started dbus.service. May 15 00:52:51.210910 jq[1199]: true May 15 00:52:51.212789 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 00:52:51.212952 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 00:52:51.213213 systemd[1]: motdgen.service: Deactivated successfully. May 15 00:52:51.213329 systemd[1]: Finished motdgen.service. May 15 00:52:51.214978 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 00:52:51.215100 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 00:52:51.217659 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 00:52:51.217693 systemd[1]: Reached target system-config.target. May 15 00:52:51.219784 jq[1202]: true May 15 00:52:51.219980 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 00:52:51.219995 systemd[1]: Reached target user-config.target. May 15 00:52:51.224603 tar[1201]: linux-amd64/helm May 15 00:52:51.235505 update_engine[1197]: I0515 00:52:51.235347 1197 main.cc:92] Flatcar Update Engine starting May 15 00:52:51.235698 extend-filesystems[1179]: Resized partition /dev/vda9 May 15 00:52:51.237816 systemd[1]: Started update-engine.service. May 15 00:52:51.237903 update_engine[1197]: I0515 00:52:51.237869 1197 update_check_scheduler.cc:74] Next update check in 4m32s May 15 00:52:51.239316 extend-filesystems[1221]: resize2fs 1.46.5 (30-Dec-2021) May 15 00:52:51.241537 systemd[1]: Started locksmithd.service. May 15 00:52:51.263187 env[1203]: time="2025-05-15T00:52:51.263131754Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 00:52:51.280689 env[1203]: time="2025-05-15T00:52:51.280651977Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 00:52:51.280800 env[1203]: time="2025-05-15T00:52:51.280776550Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 00:52:51.282047 env[1203]: time="2025-05-15T00:52:51.282016937Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 00:52:51.282047 env[1203]: time="2025-05-15T00:52:51.282042926Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 00:52:51.282214 env[1203]: time="2025-05-15T00:52:51.282188028Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:52:51.282214 env[1203]: time="2025-05-15T00:52:51.282208446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 00:52:51.282275 env[1203]: time="2025-05-15T00:52:51.282219387Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 00:52:51.282275 env[1203]: time="2025-05-15T00:52:51.282228323Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 00:52:51.282323 env[1203]: time="2025-05-15T00:52:51.282287284Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 00:52:51.282488 env[1203]: time="2025-05-15T00:52:51.282463535Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 00:52:51.282616 env[1203]: time="2025-05-15T00:52:51.282590262Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:52:51.282616 env[1203]: time="2025-05-15T00:52:51.282609238Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 00:52:51.282677 env[1203]: time="2025-05-15T00:52:51.282649073Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 00:52:51.282677 env[1203]: time="2025-05-15T00:52:51.282659612Z" level=info msg="metadata content store policy set" policy=shared May 15 00:52:51.293300 systemd-logind[1193]: Watching system buttons on /dev/input/event1 (Power Button) May 15 00:52:51.293321 systemd-logind[1193]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 00:52:51.294965 systemd-logind[1193]: New seat seat0. May 15 00:52:51.296824 systemd[1]: Started systemd-logind.service. May 15 00:52:51.311940 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 00:52:51.387079 locksmithd[1225]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 00:52:51.393935 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 00:52:51.418390 extend-filesystems[1221]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 00:52:51.418390 extend-filesystems[1221]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 00:52:51.418390 extend-filesystems[1221]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 00:52:51.425760 extend-filesystems[1179]: Resized filesystem in /dev/vda9 May 15 00:52:51.419947 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418664549Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418703111Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418714963Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418765989Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418781578Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418795033Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418869774Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418885052Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418897275Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418909678Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418933213Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.418945526Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.419058878Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 00:52:51.427050 env[1203]: time="2025-05-15T00:52:51.419125603Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 00:52:51.427321 bash[1230]: Updated "/home/core/.ssh/authorized_keys" May 15 00:52:51.420097 systemd[1]: Finished extend-filesystems.service. May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419341809Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419362247Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419373589Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419415497Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419426137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419437519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419447577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419458658Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419470921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419481471Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419491941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419503673Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419593291Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419610022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 00:52:51.433154 env[1203]: time="2025-05-15T00:52:51.419620792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 00:52:51.421781 systemd[1]: Started containerd.service. May 15 00:52:51.433484 env[1203]: time="2025-05-15T00:52:51.419631663Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 00:52:51.433484 env[1203]: time="2025-05-15T00:52:51.419645549Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 00:52:51.433484 env[1203]: time="2025-05-15T00:52:51.419655177Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 00:52:51.433484 env[1203]: time="2025-05-15T00:52:51.419672229Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 00:52:51.433484 env[1203]: time="2025-05-15T00:52:51.419721992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 00:52:51.427391 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.419897571Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.419963074Z" level=info msg="Connect containerd service" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.419997349Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.421291957Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.421581841Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.421628258Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.421792065Z" level=info msg="Start subscribing containerd event" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.421837821Z" level=info msg="Start recovering state" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.422120671Z" level=info msg="containerd successfully booted in 0.159696s" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.422659602Z" level=info msg="Start event monitor" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.422671455Z" level=info msg="Start snapshots syncer" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.422679319Z" level=info msg="Start cni network conf syncer for default" May 15 00:52:51.433617 env[1203]: time="2025-05-15T00:52:51.422686252Z" level=info msg="Start streaming server" May 15 00:52:51.606851 tar[1201]: linux-amd64/LICENSE May 15 00:52:51.606940 tar[1201]: linux-amd64/README.md May 15 00:52:51.610683 systemd[1]: Finished prepare-helm.service. May 15 00:52:51.613024 systemd-networkd[1026]: eth0: Gained IPv6LL May 15 00:52:51.614510 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 00:52:51.615746 systemd[1]: Reached target network-online.target. May 15 00:52:51.617938 systemd[1]: Starting kubelet.service... May 15 00:52:51.980772 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 00:52:52.002212 systemd[1]: Finished sshd-keygen.service. May 15 00:52:52.004393 systemd[1]: Starting issuegen.service... May 15 00:52:52.009066 systemd[1]: issuegen.service: Deactivated successfully. May 15 00:52:52.009274 systemd[1]: Finished issuegen.service. May 15 00:52:52.011640 systemd[1]: Starting systemd-user-sessions.service... May 15 00:52:52.017960 systemd[1]: Finished systemd-user-sessions.service. May 15 00:52:52.020033 systemd[1]: Started getty@tty1.service. May 15 00:52:52.022317 systemd[1]: Started serial-getty@ttyS0.service. May 15 00:52:52.023396 systemd[1]: Reached target getty.target. May 15 00:52:52.168793 systemd[1]: Started kubelet.service. May 15 00:52:52.170072 systemd[1]: Reached target multi-user.target. May 15 00:52:52.172059 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 00:52:52.179342 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 00:52:52.179505 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 00:52:52.180690 systemd[1]: Startup finished in 595ms (kernel) + 4.387s (initrd) + 4.993s (userspace) = 9.976s. May 15 00:52:52.551203 kubelet[1258]: E0515 00:52:52.551151 1258 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:52:52.552804 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:52:52.552932 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:52:55.753761 systemd[1]: Created slice system-sshd.slice. May 15 00:52:55.754649 systemd[1]: Started sshd@0-10.0.0.92:22-10.0.0.1:49038.service. May 15 00:52:55.786167 sshd[1267]: Accepted publickey for core from 10.0.0.1 port 49038 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:55.787770 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:55.795304 systemd[1]: Created slice user-500.slice. May 15 00:52:55.796296 systemd[1]: Starting user-runtime-dir@500.service... May 15 00:52:55.797862 systemd-logind[1193]: New session 1 of user core. May 15 00:52:55.803313 systemd[1]: Finished user-runtime-dir@500.service. May 15 00:52:55.804413 systemd[1]: Starting user@500.service... May 15 00:52:55.806539 (systemd)[1270]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:55.868735 systemd[1270]: Queued start job for default target default.target. May 15 00:52:55.869119 systemd[1270]: Reached target paths.target. May 15 00:52:55.869138 systemd[1270]: Reached target sockets.target. May 15 00:52:55.869149 systemd[1270]: Reached target timers.target. May 15 00:52:55.869159 systemd[1270]: Reached target basic.target. May 15 00:52:55.869191 systemd[1270]: Reached target default.target. May 15 00:52:55.869211 systemd[1270]: Startup finished in 58ms. May 15 00:52:55.869277 systemd[1]: Started user@500.service. May 15 00:52:55.870160 systemd[1]: Started session-1.scope. May 15 00:52:55.920787 systemd[1]: Started sshd@1-10.0.0.92:22-10.0.0.1:49048.service. May 15 00:52:55.949443 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 49048 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:55.950556 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:55.954060 systemd-logind[1193]: New session 2 of user core. May 15 00:52:55.954950 systemd[1]: Started session-2.scope. May 15 00:52:56.008655 sshd[1279]: pam_unix(sshd:session): session closed for user core May 15 00:52:56.011630 systemd[1]: Started sshd@2-10.0.0.92:22-10.0.0.1:49052.service. May 15 00:52:56.012712 systemd[1]: sshd@1-10.0.0.92:22-10.0.0.1:49048.service: Deactivated successfully. May 15 00:52:56.013427 systemd[1]: session-2.scope: Deactivated successfully. May 15 00:52:56.013937 systemd-logind[1193]: Session 2 logged out. Waiting for processes to exit. May 15 00:52:56.014608 systemd-logind[1193]: Removed session 2. May 15 00:52:56.039787 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 49052 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:56.040770 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:56.043954 systemd-logind[1193]: New session 3 of user core. May 15 00:52:56.044610 systemd[1]: Started session-3.scope. May 15 00:52:56.094009 sshd[1284]: pam_unix(sshd:session): session closed for user core May 15 00:52:56.096798 systemd[1]: sshd@2-10.0.0.92:22-10.0.0.1:49052.service: Deactivated successfully. May 15 00:52:56.097284 systemd[1]: session-3.scope: Deactivated successfully. May 15 00:52:56.097734 systemd-logind[1193]: Session 3 logged out. Waiting for processes to exit. May 15 00:52:56.098746 systemd[1]: Started sshd@3-10.0.0.92:22-10.0.0.1:49068.service. May 15 00:52:56.099554 systemd-logind[1193]: Removed session 3. May 15 00:52:56.127894 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 49068 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:56.129114 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:56.132139 systemd-logind[1193]: New session 4 of user core. May 15 00:52:56.132842 systemd[1]: Started session-4.scope. May 15 00:52:56.184781 sshd[1291]: pam_unix(sshd:session): session closed for user core May 15 00:52:56.187424 systemd[1]: sshd@3-10.0.0.92:22-10.0.0.1:49068.service: Deactivated successfully. May 15 00:52:56.187872 systemd[1]: session-4.scope: Deactivated successfully. May 15 00:52:56.188329 systemd-logind[1193]: Session 4 logged out. Waiting for processes to exit. May 15 00:52:56.189181 systemd[1]: Started sshd@4-10.0.0.92:22-10.0.0.1:49082.service. May 15 00:52:56.189987 systemd-logind[1193]: Removed session 4. May 15 00:52:56.216730 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 49082 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:56.217781 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:56.221109 systemd-logind[1193]: New session 5 of user core. May 15 00:52:56.221794 systemd[1]: Started session-5.scope. May 15 00:52:56.275523 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 00:52:56.275709 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:52:56.283166 dbus-daemon[1177]: \xd0-\xa4\u0019\xfeU: received setenforce notice (enforcing=-1412510752) May 15 00:52:56.284974 sudo[1300]: pam_unix(sudo:session): session closed for user root May 15 00:52:56.286515 sshd[1297]: pam_unix(sshd:session): session closed for user core May 15 00:52:56.289146 systemd[1]: sshd@4-10.0.0.92:22-10.0.0.1:49082.service: Deactivated successfully. May 15 00:52:56.289684 systemd[1]: session-5.scope: Deactivated successfully. May 15 00:52:56.290206 systemd-logind[1193]: Session 5 logged out. Waiting for processes to exit. May 15 00:52:56.291253 systemd[1]: Started sshd@5-10.0.0.92:22-10.0.0.1:49084.service. May 15 00:52:56.291839 systemd-logind[1193]: Removed session 5. May 15 00:52:56.318849 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 49084 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:56.319712 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:56.322781 systemd-logind[1193]: New session 6 of user core. May 15 00:52:56.323631 systemd[1]: Started session-6.scope. May 15 00:52:56.375847 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 00:52:56.376067 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:52:56.378528 sudo[1308]: pam_unix(sudo:session): session closed for user root May 15 00:52:56.382538 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 00:52:56.382714 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:52:56.390382 systemd[1]: Stopping audit-rules.service... May 15 00:52:56.390000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:52:56.391677 auditctl[1311]: No rules May 15 00:52:56.392061 systemd[1]: audit-rules.service: Deactivated successfully. May 15 00:52:56.392221 systemd[1]: Stopped audit-rules.service. May 15 00:52:56.392408 kernel: kauditd_printk_skb: 245 callbacks suppressed May 15 00:52:56.392439 kernel: audit: type=1305 audit(1747270376.390:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:52:56.393525 systemd[1]: Starting audit-rules.service... May 15 00:52:56.390000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd87f1ef30 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:56.398686 kernel: audit: type=1300 audit(1747270376.390:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd87f1ef30 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:56.390000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 00:52:56.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.404525 kernel: audit: type=1327 audit(1747270376.390:208): proctitle=2F7362696E2F617564697463746C002D44 May 15 00:52:56.404564 kernel: audit: type=1131 audit(1747270376.390:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.408878 augenrules[1328]: No rules May 15 00:52:56.409524 systemd[1]: Finished audit-rules.service. May 15 00:52:56.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.412152 sudo[1307]: pam_unix(sudo:session): session closed for user root May 15 00:52:56.411000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.413369 sshd[1304]: pam_unix(sshd:session): session closed for user core May 15 00:52:56.418816 kernel: audit: type=1130 audit(1747270376.408:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.418860 kernel: audit: type=1106 audit(1747270376.411:211): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.418877 kernel: audit: type=1104 audit(1747270376.411:212): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.411000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.417197 systemd[1]: Started sshd@6-10.0.0.92:22-10.0.0.1:49088.service. May 15 00:52:56.417608 systemd[1]: sshd@5-10.0.0.92:22-10.0.0.1:49084.service: Deactivated successfully. May 15 00:52:56.418124 systemd[1]: session-6.scope: Deactivated successfully. May 15 00:52:56.419027 systemd-logind[1193]: Session 6 logged out. Waiting for processes to exit. May 15 00:52:56.419998 systemd-logind[1193]: Removed session 6. May 15 00:52:56.414000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.426327 kernel: audit: type=1106 audit(1747270376.414:213): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.426385 kernel: audit: type=1104 audit(1747270376.414:214): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.414000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.92:22-10.0.0.1:49088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.433482 kernel: audit: type=1130 audit(1747270376.416:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.92:22-10.0.0.1:49088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.92:22-10.0.0.1:49084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:56.453000 audit[1333]: USER_ACCT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.454177 sshd[1333]: Accepted publickey for core from 10.0.0.1 port 49088 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:52:56.453000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.454000 audit[1333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec84e9290 a2=3 a3=0 items=0 ppid=1 pid=1333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:56.454000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:52:56.455229 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:52:56.458485 systemd-logind[1193]: New session 7 of user core. May 15 00:52:56.459194 systemd[1]: Started session-7.scope. May 15 00:52:56.461000 audit[1333]: USER_START pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.462000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:52:56.508000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.508000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.509602 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 00:52:56.509786 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:52:56.510000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:52:56.529571 systemd[1]: Starting docker.service... May 15 00:52:56.564080 env[1348]: time="2025-05-15T00:52:56.564023221Z" level=info msg="Starting up" May 15 00:52:56.565229 env[1348]: time="2025-05-15T00:52:56.565193486Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 00:52:56.565229 env[1348]: time="2025-05-15T00:52:56.565216018Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 00:52:56.565303 env[1348]: time="2025-05-15T00:52:56.565236086Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 00:52:56.565303 env[1348]: time="2025-05-15T00:52:56.565245624Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 00:52:56.567071 env[1348]: time="2025-05-15T00:52:56.567042464Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 00:52:56.567071 env[1348]: time="2025-05-15T00:52:56.567060628Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 00:52:56.567139 env[1348]: time="2025-05-15T00:52:56.567077560Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 00:52:56.567139 env[1348]: time="2025-05-15T00:52:56.567087499Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 00:52:57.183197 env[1348]: time="2025-05-15T00:52:57.183155777Z" level=info msg="Loading containers: start." May 15 00:52:57.231000 audit[1382]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.231000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdf09fc300 a2=0 a3=7ffdf09fc2ec items=0 ppid=1348 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 00:52:57.232000 audit[1384]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.232000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff8f692830 a2=0 a3=7fff8f69281c items=0 ppid=1348 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.232000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 00:52:57.234000 audit[1386]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.234000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc62bb8820 a2=0 a3=7ffc62bb880c items=0 ppid=1348 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.234000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 00:52:57.235000 audit[1388]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.235000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe780bf920 a2=0 a3=7ffe780bf90c items=0 ppid=1348 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 00:52:57.237000 audit[1390]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.237000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6f3b5c50 a2=0 a3=7ffc6f3b5c3c items=0 ppid=1348 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.237000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 00:52:57.255000 audit[1395]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.255000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee0b58aa0 a2=0 a3=7ffee0b58a8c items=0 ppid=1348 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.255000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 00:52:57.263000 audit[1397]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.263000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe3fb7fc70 a2=0 a3=7ffe3fb7fc5c items=0 ppid=1348 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 00:52:57.264000 audit[1399]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.264000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd92ca9b50 a2=0 a3=7ffd92ca9b3c items=0 ppid=1348 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 00:52:57.266000 audit[1401]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.266000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff041b1480 a2=0 a3=7fff041b146c items=0 ppid=1348 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:52:57.275000 audit[1405]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.275000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc4080eb70 a2=0 a3=7ffc4080eb5c items=0 ppid=1348 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.275000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 00:52:57.284000 audit[1406]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.284000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc3620ee60 a2=0 a3=7ffc3620ee4c items=0 ppid=1348 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:52:57.292964 kernel: Initializing XFRM netlink socket May 15 00:52:57.318669 env[1348]: time="2025-05-15T00:52:57.318636379Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 00:52:57.333000 audit[1414]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.333000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd6862f910 a2=0 a3=7ffd6862f8fc items=0 ppid=1348 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 00:52:57.344000 audit[1417]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.344000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd6289db50 a2=0 a3=7ffd6289db3c items=0 ppid=1348 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 00:52:57.346000 audit[1420]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.346000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff4edc8ee0 a2=0 a3=7fff4edc8ecc items=0 ppid=1348 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 00:52:57.348000 audit[1422]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.348000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcd4051430 a2=0 a3=7ffcd405141c items=0 ppid=1348 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 00:52:57.349000 audit[1424]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.349000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe336b7eb0 a2=0 a3=7ffe336b7e9c items=0 ppid=1348 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.349000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 00:52:57.351000 audit[1426]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.351000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffccd5c0b50 a2=0 a3=7ffccd5c0b3c items=0 ppid=1348 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.351000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 00:52:57.352000 audit[1428]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.352000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffdd21ad50 a2=0 a3=7fffdd21ad3c items=0 ppid=1348 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 00:52:57.358000 audit[1431]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.358000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff4f5fab80 a2=0 a3=7fff4f5fab6c items=0 ppid=1348 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.358000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 00:52:57.360000 audit[1433]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.360000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc651b2540 a2=0 a3=7ffc651b252c items=0 ppid=1348 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 00:52:57.362000 audit[1435]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.362000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff49d16df0 a2=0 a3=7fff49d16ddc items=0 ppid=1348 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 00:52:57.363000 audit[1437]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.363000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff523e8ed0 a2=0 a3=7fff523e8ebc items=0 ppid=1348 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.363000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 00:52:57.364809 systemd-networkd[1026]: docker0: Link UP May 15 00:52:57.373000 audit[1441]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.373000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcbf7cb710 a2=0 a3=7ffcbf7cb6fc items=0 ppid=1348 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 00:52:57.378000 audit[1442]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:52:57.378000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff3240b6b0 a2=0 a3=7fff3240b69c items=0 ppid=1348 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:52:57.378000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:52:57.380095 env[1348]: time="2025-05-15T00:52:57.380062347Z" level=info msg="Loading containers: done." May 15 00:52:57.388757 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3376700676-merged.mount: Deactivated successfully. May 15 00:52:57.393718 env[1348]: time="2025-05-15T00:52:57.393667937Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 00:52:57.393859 env[1348]: time="2025-05-15T00:52:57.393838106Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 00:52:57.393956 env[1348]: time="2025-05-15T00:52:57.393931291Z" level=info msg="Daemon has completed initialization" May 15 00:52:57.411149 systemd[1]: Started docker.service. May 15 00:52:57.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:52:57.418647 env[1348]: time="2025-05-15T00:52:57.418586507Z" level=info msg="API listen on /run/docker.sock" May 15 00:52:58.162073 env[1203]: time="2025-05-15T00:52:58.162022982Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 15 00:53:00.082700 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1408515780.mount: Deactivated successfully. May 15 00:53:01.418662 env[1203]: time="2025-05-15T00:53:01.418595621Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:01.420961 env[1203]: time="2025-05-15T00:53:01.420905033Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:01.422927 env[1203]: time="2025-05-15T00:53:01.422856032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:01.425426 env[1203]: time="2025-05-15T00:53:01.425390877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:01.427409 env[1203]: time="2025-05-15T00:53:01.427357235Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 15 00:53:01.428900 env[1203]: time="2025-05-15T00:53:01.428841479Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 15 00:53:02.803665 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 00:53:02.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:02.803858 systemd[1]: Stopped kubelet.service. May 15 00:53:02.804703 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 00:53:02.804738 kernel: audit: type=1130 audit(1747270382.802:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:02.805059 systemd[1]: Starting kubelet.service... May 15 00:53:02.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:02.810711 kernel: audit: type=1131 audit(1747270382.802:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:02.880174 systemd[1]: Started kubelet.service. May 15 00:53:02.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:02.883964 kernel: audit: type=1130 audit(1747270382.879:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:03.356300 kubelet[1484]: E0515 00:53:03.356246 1484 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:53:03.359019 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:53:03.359164 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:53:03.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:53:03.362934 kernel: audit: type=1131 audit(1747270383.358:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:53:03.449212 env[1203]: time="2025-05-15T00:53:03.449148458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:03.491284 env[1203]: time="2025-05-15T00:53:03.491216435Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:03.531765 env[1203]: time="2025-05-15T00:53:03.531683340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:03.590026 env[1203]: time="2025-05-15T00:53:03.589968937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:03.590699 env[1203]: time="2025-05-15T00:53:03.590661546Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 15 00:53:03.591281 env[1203]: time="2025-05-15T00:53:03.591242295Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 15 00:53:05.062646 env[1203]: time="2025-05-15T00:53:05.062585304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:05.064554 env[1203]: time="2025-05-15T00:53:05.064509764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:05.066511 env[1203]: time="2025-05-15T00:53:05.066466825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:05.068087 env[1203]: time="2025-05-15T00:53:05.068041889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:05.068756 env[1203]: time="2025-05-15T00:53:05.068721985Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 15 00:53:05.069204 env[1203]: time="2025-05-15T00:53:05.069182829Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 00:53:06.076964 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4031231097.mount: Deactivated successfully. May 15 00:53:07.053372 env[1203]: time="2025-05-15T00:53:07.053317689Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:07.055236 env[1203]: time="2025-05-15T00:53:07.055212653Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:07.056964 env[1203]: time="2025-05-15T00:53:07.056935345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:07.058178 env[1203]: time="2025-05-15T00:53:07.058131038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:07.060234 env[1203]: time="2025-05-15T00:53:07.059938338Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 15 00:53:07.060865 env[1203]: time="2025-05-15T00:53:07.060844207Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 00:53:07.463132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3536635371.mount: Deactivated successfully. May 15 00:53:08.361275 env[1203]: time="2025-05-15T00:53:08.361208849Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.363562 env[1203]: time="2025-05-15T00:53:08.363525504Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.367403 env[1203]: time="2025-05-15T00:53:08.367370076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.369588 env[1203]: time="2025-05-15T00:53:08.369547991Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.370450 env[1203]: time="2025-05-15T00:53:08.370405299Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 00:53:08.370961 env[1203]: time="2025-05-15T00:53:08.370934902Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 00:53:08.847093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2955797354.mount: Deactivated successfully. May 15 00:53:08.853455 env[1203]: time="2025-05-15T00:53:08.853388938Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.855516 env[1203]: time="2025-05-15T00:53:08.855468028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.857365 env[1203]: time="2025-05-15T00:53:08.857316796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.858825 env[1203]: time="2025-05-15T00:53:08.858787695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:08.859293 env[1203]: time="2025-05-15T00:53:08.859257837Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 00:53:08.859801 env[1203]: time="2025-05-15T00:53:08.859741384Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 15 00:53:09.397637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount921098117.mount: Deactivated successfully. May 15 00:53:11.928913 env[1203]: time="2025-05-15T00:53:11.928845045Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:11.930906 env[1203]: time="2025-05-15T00:53:11.930848112Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:11.932433 env[1203]: time="2025-05-15T00:53:11.932403209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:11.934139 env[1203]: time="2025-05-15T00:53:11.934105412Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:11.935112 env[1203]: time="2025-05-15T00:53:11.935081463Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 15 00:53:13.404064 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 00:53:13.404236 systemd[1]: Stopped kubelet.service. May 15 00:53:13.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:13.405438 systemd[1]: Starting kubelet.service... May 15 00:53:13.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:13.410625 kernel: audit: type=1130 audit(1747270393.403:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:13.410682 kernel: audit: type=1131 audit(1747270393.403:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:13.489778 systemd[1]: Started kubelet.service. May 15 00:53:13.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:13.493935 kernel: audit: type=1130 audit(1747270393.489:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:13.521409 kubelet[1515]: E0515 00:53:13.521365 1515 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:53:13.523062 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:53:13.523169 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:53:13.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:53:13.526942 kernel: audit: type=1131 audit(1747270393.522:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:53:14.232758 systemd[1]: Stopped kubelet.service. May 15 00:53:14.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.234751 systemd[1]: Starting kubelet.service... May 15 00:53:14.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.239619 kernel: audit: type=1130 audit(1747270394.232:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.239672 kernel: audit: type=1131 audit(1747270394.232:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.257393 systemd[1]: Reloading. May 15 00:53:14.320554 /usr/lib/systemd/system-generators/torcx-generator[1549]: time="2025-05-15T00:53:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:53:14.320873 /usr/lib/systemd/system-generators/torcx-generator[1549]: time="2025-05-15T00:53:14Z" level=info msg="torcx already run" May 15 00:53:14.677060 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:53:14.677077 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:53:14.695790 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:53:14.765540 kernel: audit: type=1400 audit(1747270394.752:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765615 kernel: audit: type=1400 audit(1747270394.752:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765634 kernel: audit: type=1400 audit(1747270394.752:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765652 kernel: audit: type=1400 audit(1747270394.752:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit: BPF prog-id=46 op=LOAD May 15 00:53:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit: BPF prog-id=47 op=LOAD May 15 00:53:14.764000 audit: BPF prog-id=30 op=UNLOAD May 15 00:53:14.764000 audit: BPF prog-id=31 op=UNLOAD May 15 00:53:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit: BPF prog-id=48 op=LOAD May 15 00:53:14.765000 audit: BPF prog-id=44 op=UNLOAD May 15 00:53:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.765000 audit: BPF prog-id=49 op=LOAD May 15 00:53:14.765000 audit: BPF prog-id=39 op=UNLOAD May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit: BPF prog-id=50 op=LOAD May 15 00:53:14.766000 audit: BPF prog-id=41 op=UNLOAD May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit: BPF prog-id=51 op=LOAD May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit: BPF prog-id=52 op=LOAD May 15 00:53:14.767000 audit: BPF prog-id=42 op=UNLOAD May 15 00:53:14.767000 audit: BPF prog-id=43 op=UNLOAD May 15 00:53:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.767000 audit: BPF prog-id=53 op=LOAD May 15 00:53:14.767000 audit: BPF prog-id=40 op=UNLOAD May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit: BPF prog-id=54 op=LOAD May 15 00:53:14.769000 audit: BPF prog-id=32 op=UNLOAD May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit: BPF prog-id=55 op=LOAD May 15 00:53:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.770000 audit: BPF prog-id=56 op=LOAD May 15 00:53:14.770000 audit: BPF prog-id=33 op=UNLOAD May 15 00:53:14.770000 audit: BPF prog-id=34 op=UNLOAD May 15 00:53:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit: BPF prog-id=57 op=LOAD May 15 00:53:14.772000 audit: BPF prog-id=35 op=UNLOAD May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit: BPF prog-id=58 op=LOAD May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.772000 audit: BPF prog-id=59 op=LOAD May 15 00:53:14.772000 audit: BPF prog-id=36 op=UNLOAD May 15 00:53:14.772000 audit: BPF prog-id=37 op=UNLOAD May 15 00:53:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:14.773000 audit: BPF prog-id=60 op=LOAD May 15 00:53:14.773000 audit: BPF prog-id=38 op=UNLOAD May 15 00:53:14.782364 systemd[1]: Started kubelet.service. May 15 00:53:14.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.784901 systemd[1]: Stopping kubelet.service... May 15 00:53:14.785235 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:53:14.785376 systemd[1]: Stopped kubelet.service. May 15 00:53:14.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.786595 systemd[1]: Starting kubelet.service... May 15 00:53:14.857318 systemd[1]: Started kubelet.service. May 15 00:53:14.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:14.887951 kubelet[1598]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:53:14.887951 kubelet[1598]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 00:53:14.887951 kubelet[1598]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:53:14.888904 kubelet[1598]: I0515 00:53:14.888859 1598 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:53:15.062593 kubelet[1598]: I0515 00:53:15.062471 1598 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 00:53:15.062593 kubelet[1598]: I0515 00:53:15.062504 1598 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:53:15.062768 kubelet[1598]: I0515 00:53:15.062744 1598 server.go:929] "Client rotation is on, will bootstrap in background" May 15 00:53:15.089665 kubelet[1598]: I0515 00:53:15.089603 1598 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:53:15.089954 kubelet[1598]: E0515 00:53:15.089929 1598 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.92:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:15.096216 kubelet[1598]: E0515 00:53:15.096170 1598 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 00:53:15.096216 kubelet[1598]: I0515 00:53:15.096200 1598 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 00:53:15.101184 kubelet[1598]: I0515 00:53:15.101156 1598 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:53:15.101269 kubelet[1598]: I0515 00:53:15.101260 1598 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 00:53:15.101418 kubelet[1598]: I0515 00:53:15.101385 1598 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:53:15.101569 kubelet[1598]: I0515 00:53:15.101414 1598 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 00:53:15.101649 kubelet[1598]: I0515 00:53:15.101578 1598 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:53:15.101649 kubelet[1598]: I0515 00:53:15.101587 1598 container_manager_linux.go:300] "Creating device plugin manager" May 15 00:53:15.101691 kubelet[1598]: I0515 00:53:15.101675 1598 state_mem.go:36] "Initialized new in-memory state store" May 15 00:53:15.106121 kubelet[1598]: I0515 00:53:15.106100 1598 kubelet.go:408] "Attempting to sync node with API server" May 15 00:53:15.106121 kubelet[1598]: I0515 00:53:15.106121 1598 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:53:15.106201 kubelet[1598]: I0515 00:53:15.106148 1598 kubelet.go:314] "Adding apiserver pod source" May 15 00:53:15.106201 kubelet[1598]: I0515 00:53:15.106160 1598 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:53:15.122232 kubelet[1598]: W0515 00:53:15.122177 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.92:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:15.122232 kubelet[1598]: E0515 00:53:15.122234 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.92:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:15.124212 kubelet[1598]: W0515 00:53:15.124175 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.92:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:15.124212 kubelet[1598]: E0515 00:53:15.124210 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.92:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:15.130279 kubelet[1598]: I0515 00:53:15.130262 1598 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:53:15.133435 kubelet[1598]: I0515 00:53:15.133419 1598 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:53:15.133479 kubelet[1598]: W0515 00:53:15.133464 1598 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 00:53:15.134320 kubelet[1598]: I0515 00:53:15.134281 1598 server.go:1269] "Started kubelet" May 15 00:53:15.134451 kubelet[1598]: I0515 00:53:15.134424 1598 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:53:15.135728 kubelet[1598]: I0515 00:53:15.135713 1598 server.go:460] "Adding debug handlers to kubelet server" May 15 00:53:15.136837 kubelet[1598]: I0515 00:53:15.136781 1598 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:53:15.137175 kubelet[1598]: I0515 00:53:15.137138 1598 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:53:15.137600 kubelet[1598]: I0515 00:53:15.137580 1598 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:53:15.137744 kubelet[1598]: I0515 00:53:15.137727 1598 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 00:53:15.137872 kubelet[1598]: I0515 00:53:15.137858 1598 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:53:15.136000 audit[1598]: AVC avc: denied { mac_admin } for pid=1598 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:15.136000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:53:15.136000 audit[1598]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000917950 a1=c000cbe570 a2=c000917920 a3=25 items=0 ppid=1 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.136000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:53:15.136000 audit[1598]: AVC avc: denied { mac_admin } for pid=1598 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:15.136000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:53:15.136000 audit[1598]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb6420 a1=c000cbe588 a2=c0009179e0 a3=25 items=0 ppid=1 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.136000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:53:15.138405 kubelet[1598]: I0515 00:53:15.138103 1598 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 00:53:15.138588 kubelet[1598]: I0515 00:53:15.138572 1598 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 00:53:15.138717 kubelet[1598]: E0515 00:53:15.138684 1598 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:53:15.138788 kubelet[1598]: I0515 00:53:15.138777 1598 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 00:53:15.138855 kubelet[1598]: I0515 00:53:15.138844 1598 reconciler.go:26] "Reconciler: start to sync state" May 15 00:53:15.141000 audit[1610]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.141000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc2a58da0 a2=0 a3=7ffdc2a58d8c items=0 ppid=1598 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:53:15.143230 kubelet[1598]: E0515 00:53:15.143195 1598 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.92:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.92:6443: connect: connection refused" interval="200ms" May 15 00:53:15.142000 audit[1611]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.142000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8efa6100 a2=0 a3=7ffc8efa60ec items=0 ppid=1598 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:53:15.143444 kubelet[1598]: E0515 00:53:15.140974 1598 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.92:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.92:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f8d2abc88c2b1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 00:53:15.134263985 +0000 UTC m=+0.273837713,LastTimestamp:2025-05-15 00:53:15.134263985 +0000 UTC m=+0.273837713,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 00:53:15.143525 kubelet[1598]: W0515 00:53:15.143431 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:15.143525 kubelet[1598]: E0515 00:53:15.143483 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:15.144240 kubelet[1598]: E0515 00:53:15.144216 1598 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:53:15.145196 kubelet[1598]: I0515 00:53:15.145173 1598 factory.go:221] Registration of the containerd container factory successfully May 15 00:53:15.145196 kubelet[1598]: I0515 00:53:15.145189 1598 factory.go:221] Registration of the systemd container factory successfully May 15 00:53:15.145275 kubelet[1598]: I0515 00:53:15.145238 1598 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:53:15.144000 audit[1613]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.144000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3742e300 a2=0 a3=7ffe3742e2ec items=0 ppid=1598 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:53:15.146000 audit[1615]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.146000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe00922100 a2=0 a3=7ffe009220ec items=0 ppid=1598 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:53:15.152000 audit[1618]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.152000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe471503d0 a2=0 a3=7ffe471503bc items=0 ppid=1598 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 00:53:15.153473 kubelet[1598]: I0515 00:53:15.153443 1598 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:53:15.153000 audit[1621]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:15.153000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffbcb3c9c0 a2=0 a3=7fffbcb3c9ac items=0 ppid=1598 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:53:15.154457 kubelet[1598]: I0515 00:53:15.154433 1598 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:53:15.154457 kubelet[1598]: I0515 00:53:15.154455 1598 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 00:53:15.154535 kubelet[1598]: I0515 00:53:15.154473 1598 kubelet.go:2321] "Starting kubelet main sync loop" May 15 00:53:15.154535 kubelet[1598]: E0515 00:53:15.154513 1598 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:53:15.154000 audit[1623]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.154000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe75b80ed0 a2=0 a3=7ffe75b80ebc items=0 ppid=1598 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:53:15.155000 audit[1625]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:15.155000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0e2fe8a0 a2=0 a3=7ffe0e2fe88c items=0 ppid=1598 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:53:15.155000 audit[1624]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.155000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5a6631e0 a2=0 a3=10e3 items=0 ppid=1598 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:53:15.156000 audit[1626]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:15.156000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd3ba694c0 a2=0 a3=7ffd3ba694ac items=0 ppid=1598 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:53:15.156000 audit[1627]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:15.156000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0ffcd920 a2=0 a3=7fff0ffcd90c items=0 ppid=1598 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:53:15.157713 kubelet[1598]: W0515 00:53:15.157669 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:15.157772 kubelet[1598]: E0515 00:53:15.157715 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:15.156000 audit[1628]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:15.156000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc37fcbc80 a2=0 a3=7ffc37fcbc6c items=0 ppid=1598 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:53:15.158007 kubelet[1598]: I0515 00:53:15.157984 1598 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 00:53:15.158007 kubelet[1598]: I0515 00:53:15.157997 1598 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 00:53:15.158085 kubelet[1598]: I0515 00:53:15.158011 1598 state_mem.go:36] "Initialized new in-memory state store" May 15 00:53:15.239455 kubelet[1598]: E0515 00:53:15.239401 1598 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:53:15.254766 kubelet[1598]: E0515 00:53:15.254737 1598 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 00:53:15.340066 kubelet[1598]: E0515 00:53:15.339978 1598 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:53:15.344427 kubelet[1598]: E0515 00:53:15.344384 1598 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.92:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.92:6443: connect: connection refused" interval="400ms" May 15 00:53:15.397542 kubelet[1598]: I0515 00:53:15.397503 1598 policy_none.go:49] "None policy: Start" May 15 00:53:15.398182 kubelet[1598]: I0515 00:53:15.398160 1598 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 00:53:15.398228 kubelet[1598]: I0515 00:53:15.398197 1598 state_mem.go:35] "Initializing new in-memory state store" May 15 00:53:15.404421 systemd[1]: Created slice kubepods.slice. May 15 00:53:15.407472 systemd[1]: Created slice kubepods-burstable.slice. May 15 00:53:15.409505 systemd[1]: Created slice kubepods-besteffort.slice. May 15 00:53:15.422377 kubelet[1598]: I0515 00:53:15.422358 1598 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:53:15.421000 audit[1598]: AVC avc: denied { mac_admin } for pid=1598 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:15.421000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:53:15.421000 audit[1598]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5c360 a1=c000810c18 a2=c000b5c330 a3=25 items=0 ppid=1 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:15.421000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:53:15.422641 kubelet[1598]: I0515 00:53:15.422404 1598 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:53:15.422641 kubelet[1598]: I0515 00:53:15.422492 1598 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 00:53:15.422641 kubelet[1598]: I0515 00:53:15.422501 1598 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:53:15.422746 kubelet[1598]: I0515 00:53:15.422688 1598 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:53:15.423577 kubelet[1598]: E0515 00:53:15.423563 1598 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 00:53:15.460625 systemd[1]: Created slice kubepods-burstable-podb06d7154c958467df3ead410478b9f20.slice. May 15 00:53:15.470453 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 15 00:53:15.472805 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 15 00:53:15.524235 kubelet[1598]: I0515 00:53:15.524195 1598 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 00:53:15.524525 kubelet[1598]: E0515 00:53:15.524492 1598 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.92:6443/api/v1/nodes\": dial tcp 10.0.0.92:6443: connect: connection refused" node="localhost" May 15 00:53:15.540725 kubelet[1598]: I0515 00:53:15.540705 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:15.540769 kubelet[1598]: I0515 00:53:15.540729 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:15.540769 kubelet[1598]: I0515 00:53:15.540756 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b06d7154c958467df3ead410478b9f20-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"b06d7154c958467df3ead410478b9f20\") " pod="kube-system/kube-apiserver-localhost" May 15 00:53:15.540812 kubelet[1598]: I0515 00:53:15.540773 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b06d7154c958467df3ead410478b9f20-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"b06d7154c958467df3ead410478b9f20\") " pod="kube-system/kube-apiserver-localhost" May 15 00:53:15.540812 kubelet[1598]: I0515 00:53:15.540806 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:15.540858 kubelet[1598]: I0515 00:53:15.540845 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:15.540893 kubelet[1598]: I0515 00:53:15.540877 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:15.540928 kubelet[1598]: I0515 00:53:15.540903 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 00:53:15.540957 kubelet[1598]: I0515 00:53:15.540943 1598 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b06d7154c958467df3ead410478b9f20-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"b06d7154c958467df3ead410478b9f20\") " pod="kube-system/kube-apiserver-localhost" May 15 00:53:15.725717 kubelet[1598]: I0515 00:53:15.725679 1598 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 00:53:15.726000 kubelet[1598]: E0515 00:53:15.725978 1598 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.92:6443/api/v1/nodes\": dial tcp 10.0.0.92:6443: connect: connection refused" node="localhost" May 15 00:53:15.745539 kubelet[1598]: E0515 00:53:15.745510 1598 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.92:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.92:6443: connect: connection refused" interval="800ms" May 15 00:53:15.768663 kubelet[1598]: E0515 00:53:15.768637 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:15.769089 env[1203]: time="2025-05-15T00:53:15.769050994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:b06d7154c958467df3ead410478b9f20,Namespace:kube-system,Attempt:0,}" May 15 00:53:15.772217 kubelet[1598]: E0515 00:53:15.772199 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:15.772488 env[1203]: time="2025-05-15T00:53:15.772444990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 15 00:53:15.774609 kubelet[1598]: E0515 00:53:15.774578 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:15.774804 env[1203]: time="2025-05-15T00:53:15.774779088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 15 00:53:15.987278 kubelet[1598]: W0515 00:53:15.987137 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.92:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:15.987278 kubelet[1598]: E0515 00:53:15.987216 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.92:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:16.107431 kubelet[1598]: W0515 00:53:16.107372 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:16.107515 kubelet[1598]: E0515 00:53:16.107438 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:16.127934 kubelet[1598]: I0515 00:53:16.127906 1598 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 00:53:16.128259 kubelet[1598]: E0515 00:53:16.128229 1598 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.92:6443/api/v1/nodes\": dial tcp 10.0.0.92:6443: connect: connection refused" node="localhost" May 15 00:53:16.187367 kubelet[1598]: W0515 00:53:16.187319 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.92:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:16.187421 kubelet[1598]: E0515 00:53:16.187373 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.92:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:16.333546 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2645249160.mount: Deactivated successfully. May 15 00:53:16.338145 env[1203]: time="2025-05-15T00:53:16.338103183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.342005 env[1203]: time="2025-05-15T00:53:16.341955068Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.343337 env[1203]: time="2025-05-15T00:53:16.343308617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.344043 env[1203]: time="2025-05-15T00:53:16.344019831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.345142 env[1203]: time="2025-05-15T00:53:16.345119283Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.351152 env[1203]: time="2025-05-15T00:53:16.351061198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.352472 env[1203]: time="2025-05-15T00:53:16.352422021Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.353900 env[1203]: time="2025-05-15T00:53:16.353851733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.356046 env[1203]: time="2025-05-15T00:53:16.356013928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.358729 env[1203]: time="2025-05-15T00:53:16.358685139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.360078 env[1203]: time="2025-05-15T00:53:16.360048766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.362375 env[1203]: time="2025-05-15T00:53:16.362345244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:16.372029 env[1203]: time="2025-05-15T00:53:16.371957273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:16.372029 env[1203]: time="2025-05-15T00:53:16.371991407Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:16.372029 env[1203]: time="2025-05-15T00:53:16.372002007Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:16.372269 env[1203]: time="2025-05-15T00:53:16.372105020Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e708c922ba8344028841e872cffb13c18b5fd610609c80cb2a36efc95644678f pid=1639 runtime=io.containerd.runc.v2 May 15 00:53:16.387542 systemd[1]: Started cri-containerd-e708c922ba8344028841e872cffb13c18b5fd610609c80cb2a36efc95644678f.scope. May 15 00:53:16.394360 env[1203]: time="2025-05-15T00:53:16.394311534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:16.394579 env[1203]: time="2025-05-15T00:53:16.394551694Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:16.394702 env[1203]: time="2025-05-15T00:53:16.394676248Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:16.394959 env[1203]: time="2025-05-15T00:53:16.394935534Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e86a5fca319d40c410566db4789f73fb3fdba9ed383f45727765234af461f2e8 pid=1675 runtime=io.containerd.runc.v2 May 15 00:53:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.396000 audit: BPF prog-id=61 op=LOAD May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1639 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303863393232626138333434303238383431653837326366666231 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1639 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303863393232626138333434303238383431653837326366666231 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit: BPF prog-id=62 op=LOAD May 15 00:53:16.397000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002b1920 items=0 ppid=1639 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303863393232626138333434303238383431653837326366666231 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit: BPF prog-id=63 op=LOAD May 15 00:53:16.397000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002b1968 items=0 ppid=1639 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303863393232626138333434303238383431653837326366666231 May 15 00:53:16.397000 audit: BPF prog-id=63 op=UNLOAD May 15 00:53:16.397000 audit: BPF prog-id=62 op=UNLOAD May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.397000 audit: BPF prog-id=64 op=LOAD May 15 00:53:16.397000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002b1d78 items=0 ppid=1639 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303863393232626138333434303238383431653837326366666231 May 15 00:53:16.400991 env[1203]: time="2025-05-15T00:53:16.400935829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:16.400991 env[1203]: time="2025-05-15T00:53:16.400970414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:16.400991 env[1203]: time="2025-05-15T00:53:16.400980573Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:16.401200 env[1203]: time="2025-05-15T00:53:16.401168736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e6310924caec8e30568965d12914eecb1812d31a449d3330608d1fda601a10a pid=1697 runtime=io.containerd.runc.v2 May 15 00:53:16.405902 systemd[1]: Started cri-containerd-e86a5fca319d40c410566db4789f73fb3fdba9ed383f45727765234af461f2e8.scope. May 15 00:53:16.416761 systemd[1]: Started cri-containerd-0e6310924caec8e30568965d12914eecb1812d31a449d3330608d1fda601a10a.scope. May 15 00:53:16.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.421000 audit: BPF prog-id=65 op=LOAD May 15 00:53:16.422000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.422000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1675 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538366135666361333139643430633431303536366462343738396637 May 15 00:53:16.422000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.422000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1675 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538366135666361333139643430633431303536366462343738396637 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit: BPF prog-id=66 op=LOAD May 15 00:53:16.423000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003c07a0 items=0 ppid=1675 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538366135666361333139643430633431303536366462343738396637 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.423000 audit: BPF prog-id=67 op=LOAD May 15 00:53:16.423000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003c07e8 items=0 ppid=1675 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538366135666361333139643430633431303536366462343738396637 May 15 00:53:16.424000 audit: BPF prog-id=67 op=UNLOAD May 15 00:53:16.424000 audit: BPF prog-id=66 op=UNLOAD May 15 00:53:16.424000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.424000 audit: BPF prog-id=68 op=LOAD May 15 00:53:16.424000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003c0bf8 items=0 ppid=1675 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538366135666361333139643430633431303536366462343738396637 May 15 00:53:16.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.434000 audit: BPF prog-id=69 op=LOAD May 15 00:53:16.435667 env[1203]: time="2025-05-15T00:53:16.434591247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:b06d7154c958467df3ead410478b9f20,Namespace:kube-system,Attempt:0,} returns sandbox id \"e708c922ba8344028841e872cffb13c18b5fd610609c80cb2a36efc95644678f\"" May 15 00:53:16.435717 kubelet[1598]: E0515 00:53:16.435649 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1697 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363331303932346361656338653330353638393635643132393134 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1697 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363331303932346361656338653330353638393635643132393134 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit: BPF prog-id=70 op=LOAD May 15 00:53:16.435000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000261ce0 items=0 ppid=1697 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363331303932346361656338653330353638393635643132393134 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit: BPF prog-id=71 op=LOAD May 15 00:53:16.435000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000261d28 items=0 ppid=1697 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363331303932346361656338653330353638393635643132393134 May 15 00:53:16.435000 audit: BPF prog-id=71 op=UNLOAD May 15 00:53:16.435000 audit: BPF prog-id=70 op=UNLOAD May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.435000 audit: BPF prog-id=72 op=LOAD May 15 00:53:16.435000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003e2138 items=0 ppid=1697 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363331303932346361656338653330353638393635643132393134 May 15 00:53:16.437589 env[1203]: time="2025-05-15T00:53:16.437352186Z" level=info msg="CreateContainer within sandbox \"e708c922ba8344028841e872cffb13c18b5fd610609c80cb2a36efc95644678f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 00:53:16.450408 env[1203]: time="2025-05-15T00:53:16.450357570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"e86a5fca319d40c410566db4789f73fb3fdba9ed383f45727765234af461f2e8\"" May 15 00:53:16.451030 kubelet[1598]: E0515 00:53:16.451006 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:16.452121 env[1203]: time="2025-05-15T00:53:16.452101441Z" level=info msg="CreateContainer within sandbox \"e86a5fca319d40c410566db4789f73fb3fdba9ed383f45727765234af461f2e8\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 00:53:16.457374 env[1203]: time="2025-05-15T00:53:16.457342983Z" level=info msg="CreateContainer within sandbox \"e708c922ba8344028841e872cffb13c18b5fd610609c80cb2a36efc95644678f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"438cfdc4911bf0fdb96688b75256974b2d75e8a7f4616b0a3215c25848fc8177\"" May 15 00:53:16.457885 env[1203]: time="2025-05-15T00:53:16.457841578Z" level=info msg="StartContainer for \"438cfdc4911bf0fdb96688b75256974b2d75e8a7f4616b0a3215c25848fc8177\"" May 15 00:53:16.471270 env[1203]: time="2025-05-15T00:53:16.471217467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"0e6310924caec8e30568965d12914eecb1812d31a449d3330608d1fda601a10a\"" May 15 00:53:16.471896 kubelet[1598]: W0515 00:53:16.471833 1598 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused May 15 00:53:16.471969 kubelet[1598]: E0515 00:53:16.471909 1598 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.92:6443: connect: connection refused" logger="UnhandledError" May 15 00:53:16.472070 kubelet[1598]: E0515 00:53:16.471992 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:16.473879 env[1203]: time="2025-05-15T00:53:16.473838944Z" level=info msg="CreateContainer within sandbox \"0e6310924caec8e30568965d12914eecb1812d31a449d3330608d1fda601a10a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 00:53:16.476899 systemd[1]: Started cri-containerd-438cfdc4911bf0fdb96688b75256974b2d75e8a7f4616b0a3215c25848fc8177.scope. May 15 00:53:16.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.486000 audit: BPF prog-id=73 op=LOAD May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1639 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386366646334393131626630666462393636383862373532353639 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1639 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386366646334393131626630666462393636383862373532353639 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit: BPF prog-id=74 op=LOAD May 15 00:53:16.487000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c6410 items=0 ppid=1639 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386366646334393131626630666462393636383862373532353639 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit: BPF prog-id=75 op=LOAD May 15 00:53:16.487000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c6458 items=0 ppid=1639 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386366646334393131626630666462393636383862373532353639 May 15 00:53:16.487000 audit: BPF prog-id=75 op=UNLOAD May 15 00:53:16.487000 audit: BPF prog-id=74 op=UNLOAD May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.487000 audit: BPF prog-id=76 op=LOAD May 15 00:53:16.487000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c6868 items=0 ppid=1639 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386366646334393131626630666462393636383862373532353639 May 15 00:53:16.929752 kubelet[1598]: I0515 00:53:16.929720 1598 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 00:53:16.937144 env[1203]: time="2025-05-15T00:53:16.937084941Z" level=info msg="StartContainer for \"438cfdc4911bf0fdb96688b75256974b2d75e8a7f4616b0a3215c25848fc8177\" returns successfully" May 15 00:53:16.949599 env[1203]: time="2025-05-15T00:53:16.949538410Z" level=info msg="CreateContainer within sandbox \"e86a5fca319d40c410566db4789f73fb3fdba9ed383f45727765234af461f2e8\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a145acb05a4848d5c525b122516ec24e18656ee8db41ccc0a2739e78d6d2be2d\"" May 15 00:53:16.950138 env[1203]: time="2025-05-15T00:53:16.950116505Z" level=info msg="StartContainer for \"a145acb05a4848d5c525b122516ec24e18656ee8db41ccc0a2739e78d6d2be2d\"" May 15 00:53:16.956618 env[1203]: time="2025-05-15T00:53:16.956573206Z" level=info msg="CreateContainer within sandbox \"0e6310924caec8e30568965d12914eecb1812d31a449d3330608d1fda601a10a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"45f6391d079652664a4f67f2c3c7e16dd400f239000560f393a40903e23670fa\"" May 15 00:53:16.957098 env[1203]: time="2025-05-15T00:53:16.957068575Z" level=info msg="StartContainer for \"45f6391d079652664a4f67f2c3c7e16dd400f239000560f393a40903e23670fa\"" May 15 00:53:16.966026 systemd[1]: Started cri-containerd-a145acb05a4848d5c525b122516ec24e18656ee8db41ccc0a2739e78d6d2be2d.scope. May 15 00:53:16.979670 systemd[1]: Started cri-containerd-45f6391d079652664a4f67f2c3c7e16dd400f239000560f393a40903e23670fa.scope. May 15 00:53:16.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.981000 audit: BPF prog-id=77 op=LOAD May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1675 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343561636230356134383438643563353235623132323531366563 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1675 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343561636230356134383438643563353235623132323531366563 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit: BPF prog-id=78 op=LOAD May 15 00:53:16.982000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000309d30 items=0 ppid=1675 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343561636230356134383438643563353235623132323531366563 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit: BPF prog-id=79 op=LOAD May 15 00:53:16.982000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000309d78 items=0 ppid=1675 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343561636230356134383438643563353235623132323531366563 May 15 00:53:16.982000 audit: BPF prog-id=79 op=UNLOAD May 15 00:53:16.982000 audit: BPF prog-id=78 op=UNLOAD May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.982000 audit: BPF prog-id=80 op=LOAD May 15 00:53:16.982000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000378188 items=0 ppid=1675 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343561636230356134383438643563353235623132323531366563 May 15 00:53:16.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.991000 audit: BPF prog-id=81 op=LOAD May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663633393164303739363532363634613466363766326333633765 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663633393164303739363532363634613466363766326333633765 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit: BPF prog-id=82 op=LOAD May 15 00:53:16.992000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000388370 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663633393164303739363532363634613466363766326333633765 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit: BPF prog-id=83 op=LOAD May 15 00:53:16.992000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003883b8 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663633393164303739363532363634613466363766326333633765 May 15 00:53:16.992000 audit: BPF prog-id=83 op=UNLOAD May 15 00:53:16.992000 audit: BPF prog-id=82 op=UNLOAD May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:16.992000 audit: BPF prog-id=84 op=LOAD May 15 00:53:16.992000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003887c8 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:16.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663633393164303739363532363634613466363766326333633765 May 15 00:53:17.017586 env[1203]: time="2025-05-15T00:53:17.017518852Z" level=info msg="StartContainer for \"45f6391d079652664a4f67f2c3c7e16dd400f239000560f393a40903e23670fa\" returns successfully" May 15 00:53:17.018434 env[1203]: time="2025-05-15T00:53:17.018411577Z" level=info msg="StartContainer for \"a145acb05a4848d5c525b122516ec24e18656ee8db41ccc0a2739e78d6d2be2d\" returns successfully" May 15 00:53:17.162796 kubelet[1598]: E0515 00:53:17.162760 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:17.165146 kubelet[1598]: E0515 00:53:17.165122 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:17.167100 kubelet[1598]: E0515 00:53:17.167079 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:17.628000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.628000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000135140 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:17.628000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:17.629000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.629000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00019dc40 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:17.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:17.658000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.658000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c004660940 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:53:17.658000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:53:17.658000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.658000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003afc510 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:53:17.658000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:53:17.660000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.660000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c003afd5c0 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:53:17.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:53:17.661000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.661000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c004ba2f60 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:53:17.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:53:17.661000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.661000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5a a1=c004fa0660 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:53:17.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:53:17.658000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:17.658000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005dc9c80 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:53:17.658000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:53:17.698542 kubelet[1598]: E0515 00:53:17.698491 1598 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 00:53:17.950183 kubelet[1598]: I0515 00:53:17.950140 1598 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 00:53:17.950183 kubelet[1598]: E0515 00:53:17.950176 1598 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 15 00:53:17.967205 kubelet[1598]: E0515 00:53:17.967101 1598 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.183f8d2abc88c2b1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 00:53:15.134263985 +0000 UTC m=+0.273837713,LastTimestamp:2025-05-15 00:53:15.134263985 +0000 UTC m=+0.273837713,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 00:53:18.045857 kubelet[1598]: E0515 00:53:18.045802 1598 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:53:18.146101 kubelet[1598]: E0515 00:53:18.146056 1598 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:53:18.339187 kubelet[1598]: E0515 00:53:18.339064 1598 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 15 00:53:18.339528 kubelet[1598]: E0515 00:53:18.339230 1598 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:19.125111 kubelet[1598]: I0515 00:53:19.125064 1598 apiserver.go:52] "Watching apiserver" May 15 00:53:19.139583 kubelet[1598]: I0515 00:53:19.139543 1598 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 00:53:20.317389 systemd[1]: Reloading. May 15 00:53:20.377335 /usr/lib/systemd/system-generators/torcx-generator[1889]: time="2025-05-15T00:53:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:53:20.377750 /usr/lib/systemd/system-generators/torcx-generator[1889]: time="2025-05-15T00:53:20Z" level=info msg="torcx already run" May 15 00:53:20.445572 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:53:20.445589 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:53:20.462321 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:53:20.540298 kernel: kauditd_printk_skb: 585 callbacks suppressed May 15 00:53:20.540430 kernel: audit: type=1400 audit(1747270400.532:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.540452 kernel: audit: type=1400 audit(1747270400.532:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.544054 kernel: audit: type=1400 audit(1747270400.532:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.544130 kernel: audit: type=1400 audit(1747270400.532:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.550471 kernel: audit: type=1400 audit(1747270400.532:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.550522 kernel: audit: type=1400 audit(1747270400.532:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.553429 kernel: audit: type=1400 audit(1747270400.532:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.556354 kernel: audit: type=1400 audit(1747270400.532:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.562239 kernel: audit: type=1400 audit(1747270400.536:574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.562286 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 00:53:20.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit: BPF prog-id=85 op=LOAD May 15 00:53:20.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit: BPF prog-id=86 op=LOAD May 15 00:53:20.539000 audit: BPF prog-id=46 op=UNLOAD May 15 00:53:20.539000 audit: BPF prog-id=47 op=UNLOAD May 15 00:53:20.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit: BPF prog-id=87 op=LOAD May 15 00:53:20.543000 audit: BPF prog-id=48 op=UNLOAD May 15 00:53:20.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.546000 audit: BPF prog-id=88 op=LOAD May 15 00:53:20.546000 audit: BPF prog-id=49 op=UNLOAD May 15 00:53:20.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit: BPF prog-id=89 op=LOAD May 15 00:53:20.552000 audit: BPF prog-id=50 op=UNLOAD May 15 00:53:20.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit: BPF prog-id=90 op=LOAD May 15 00:53:20.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit: BPF prog-id=91 op=LOAD May 15 00:53:20.563000 audit: BPF prog-id=51 op=UNLOAD May 15 00:53:20.563000 audit: BPF prog-id=52 op=UNLOAD May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.563000 audit: BPF prog-id=92 op=LOAD May 15 00:53:20.563000 audit: BPF prog-id=53 op=UNLOAD May 15 00:53:20.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.565000 audit: BPF prog-id=93 op=LOAD May 15 00:53:20.565000 audit: BPF prog-id=69 op=UNLOAD May 15 00:53:20.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.566000 audit: BPF prog-id=94 op=LOAD May 15 00:53:20.566000 audit: BPF prog-id=61 op=UNLOAD May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit: BPF prog-id=95 op=LOAD May 15 00:53:20.567000 audit: BPF prog-id=54 op=UNLOAD May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit: BPF prog-id=96 op=LOAD May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.567000 audit: BPF prog-id=97 op=LOAD May 15 00:53:20.567000 audit: BPF prog-id=55 op=UNLOAD May 15 00:53:20.567000 audit: BPF prog-id=56 op=UNLOAD May 15 00:53:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.568000 audit: BPF prog-id=98 op=LOAD May 15 00:53:20.568000 audit: BPF prog-id=81 op=UNLOAD May 15 00:53:20.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit: BPF prog-id=99 op=LOAD May 15 00:53:20.570000 audit: BPF prog-id=65 op=UNLOAD May 15 00:53:20.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.570000 audit: BPF prog-id=100 op=LOAD May 15 00:53:20.570000 audit: BPF prog-id=73 op=UNLOAD May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit: BPF prog-id=101 op=LOAD May 15 00:53:20.571000 audit: BPF prog-id=57 op=UNLOAD May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit: BPF prog-id=102 op=LOAD May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.571000 audit: BPF prog-id=103 op=LOAD May 15 00:53:20.571000 audit: BPF prog-id=58 op=UNLOAD May 15 00:53:20.571000 audit: BPF prog-id=59 op=UNLOAD May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit: BPF prog-id=104 op=LOAD May 15 00:53:20.572000 audit: BPF prog-id=60 op=UNLOAD May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.573000 audit: BPF prog-id=105 op=LOAD May 15 00:53:20.573000 audit: BPF prog-id=77 op=UNLOAD May 15 00:53:20.583558 systemd[1]: Stopping kubelet.service... May 15 00:53:20.610284 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:53:20.610710 systemd[1]: Stopped kubelet.service. May 15 00:53:20.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:20.612473 systemd[1]: Starting kubelet.service... May 15 00:53:20.689315 systemd[1]: Started kubelet.service. May 15 00:53:20.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:20.726382 kubelet[1936]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:53:20.726382 kubelet[1936]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 00:53:20.726382 kubelet[1936]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:53:20.726732 kubelet[1936]: I0515 00:53:20.726435 1936 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:53:20.731752 kubelet[1936]: I0515 00:53:20.731719 1936 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 00:53:20.731752 kubelet[1936]: I0515 00:53:20.731749 1936 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:53:20.732007 kubelet[1936]: I0515 00:53:20.731992 1936 server.go:929] "Client rotation is on, will bootstrap in background" May 15 00:53:20.733184 kubelet[1936]: I0515 00:53:20.733164 1936 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 00:53:20.734784 kubelet[1936]: I0515 00:53:20.734765 1936 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:53:20.737314 kubelet[1936]: E0515 00:53:20.737288 1936 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 00:53:20.737384 kubelet[1936]: I0515 00:53:20.737315 1936 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 00:53:20.740414 kubelet[1936]: I0515 00:53:20.740382 1936 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:53:20.740542 kubelet[1936]: I0515 00:53:20.740479 1936 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 00:53:20.740596 kubelet[1936]: I0515 00:53:20.740571 1936 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:53:20.740738 kubelet[1936]: I0515 00:53:20.740595 1936 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 00:53:20.740738 kubelet[1936]: I0515 00:53:20.740735 1936 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:53:20.740841 kubelet[1936]: I0515 00:53:20.740742 1936 container_manager_linux.go:300] "Creating device plugin manager" May 15 00:53:20.740841 kubelet[1936]: I0515 00:53:20.740764 1936 state_mem.go:36] "Initialized new in-memory state store" May 15 00:53:20.740841 kubelet[1936]: I0515 00:53:20.740828 1936 kubelet.go:408] "Attempting to sync node with API server" May 15 00:53:20.740841 kubelet[1936]: I0515 00:53:20.740837 1936 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:53:20.740938 kubelet[1936]: I0515 00:53:20.740857 1936 kubelet.go:314] "Adding apiserver pod source" May 15 00:53:20.740938 kubelet[1936]: I0515 00:53:20.740867 1936 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:53:20.747719 kubelet[1936]: I0515 00:53:20.747687 1936 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:53:20.748280 kubelet[1936]: I0515 00:53:20.748259 1936 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:53:20.749095 kubelet[1936]: I0515 00:53:20.749079 1936 server.go:1269] "Started kubelet" May 15 00:53:20.749562 kubelet[1936]: I0515 00:53:20.749533 1936 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:53:20.749751 kubelet[1936]: I0515 00:53:20.749691 1936 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:53:20.749000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.749000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:53:20.749000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006318f0 a1=c0004ebfc8 a2=c0006318c0 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:20.749000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:53:20.749000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.749000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:53:20.749000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cbe620 a1=c0004ebfe0 a2=c000631980 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:20.749000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:53:20.751155 kubelet[1936]: I0515 00:53:20.750844 1936 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:53:20.751155 kubelet[1936]: I0515 00:53:20.750878 1936 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 00:53:20.751155 kubelet[1936]: I0515 00:53:20.750897 1936 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:53:20.751250 kubelet[1936]: I0515 00:53:20.751230 1936 server.go:460] "Adding debug handlers to kubelet server" May 15 00:53:20.751372 kubelet[1936]: I0515 00:53:20.751271 1936 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:53:20.752986 kubelet[1936]: I0515 00:53:20.752896 1936 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 00:53:20.754215 kubelet[1936]: E0515 00:53:20.754068 1936 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:53:20.754261 kubelet[1936]: I0515 00:53:20.754226 1936 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 00:53:20.755195 kubelet[1936]: I0515 00:53:20.754433 1936 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 00:53:20.755195 kubelet[1936]: I0515 00:53:20.754500 1936 reconciler.go:26] "Reconciler: start to sync state" May 15 00:53:20.755754 kubelet[1936]: I0515 00:53:20.755706 1936 factory.go:221] Registration of the containerd container factory successfully May 15 00:53:20.755754 kubelet[1936]: I0515 00:53:20.755725 1936 factory.go:221] Registration of the systemd container factory successfully May 15 00:53:20.755971 kubelet[1936]: I0515 00:53:20.755835 1936 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:53:20.762790 kubelet[1936]: I0515 00:53:20.762753 1936 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:53:20.763503 kubelet[1936]: I0515 00:53:20.763486 1936 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:53:20.763548 kubelet[1936]: I0515 00:53:20.763512 1936 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 00:53:20.763548 kubelet[1936]: I0515 00:53:20.763527 1936 kubelet.go:2321] "Starting kubelet main sync loop" May 15 00:53:20.763599 kubelet[1936]: E0515 00:53:20.763559 1936 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:53:20.787105 kubelet[1936]: I0515 00:53:20.787069 1936 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 00:53:20.787105 kubelet[1936]: I0515 00:53:20.787090 1936 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 00:53:20.787105 kubelet[1936]: I0515 00:53:20.787108 1936 state_mem.go:36] "Initialized new in-memory state store" May 15 00:53:20.787287 kubelet[1936]: I0515 00:53:20.787262 1936 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 00:53:20.787287 kubelet[1936]: I0515 00:53:20.787271 1936 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 00:53:20.787287 kubelet[1936]: I0515 00:53:20.787289 1936 policy_none.go:49] "None policy: Start" May 15 00:53:20.787779 kubelet[1936]: I0515 00:53:20.787765 1936 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 00:53:20.787859 kubelet[1936]: I0515 00:53:20.787846 1936 state_mem.go:35] "Initializing new in-memory state store" May 15 00:53:20.788116 kubelet[1936]: I0515 00:53:20.788103 1936 state_mem.go:75] "Updated machine memory state" May 15 00:53:20.791132 kubelet[1936]: I0515 00:53:20.791118 1936 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:53:20.790000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:20.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:53:20.790000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00057c900 a1=c000a4d878 a2=c00057c840 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:20.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:53:20.791545 kubelet[1936]: I0515 00:53:20.791239 1936 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:53:20.791545 kubelet[1936]: I0515 00:53:20.791355 1936 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 00:53:20.791545 kubelet[1936]: I0515 00:53:20.791370 1936 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:53:20.791890 kubelet[1936]: I0515 00:53:20.791712 1936 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:53:20.898539 kubelet[1936]: I0515 00:53:20.898428 1936 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 00:53:20.903584 kubelet[1936]: I0515 00:53:20.903558 1936 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 15 00:53:20.903685 kubelet[1936]: I0515 00:53:20.903625 1936 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 00:53:20.955684 kubelet[1936]: I0515 00:53:20.955643 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 00:53:20.955684 kubelet[1936]: I0515 00:53:20.955670 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b06d7154c958467df3ead410478b9f20-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"b06d7154c958467df3ead410478b9f20\") " pod="kube-system/kube-apiserver-localhost" May 15 00:53:20.955684 kubelet[1936]: I0515 00:53:20.955689 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:20.955878 kubelet[1936]: I0515 00:53:20.955707 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:20.955878 kubelet[1936]: I0515 00:53:20.955726 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:20.955878 kubelet[1936]: I0515 00:53:20.955741 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b06d7154c958467df3ead410478b9f20-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"b06d7154c958467df3ead410478b9f20\") " pod="kube-system/kube-apiserver-localhost" May 15 00:53:20.955878 kubelet[1936]: I0515 00:53:20.955756 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b06d7154c958467df3ead410478b9f20-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"b06d7154c958467df3ead410478b9f20\") " pod="kube-system/kube-apiserver-localhost" May 15 00:53:20.955878 kubelet[1936]: I0515 00:53:20.955770 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:20.956013 kubelet[1936]: I0515 00:53:20.955784 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:53:21.168289 kubelet[1936]: E0515 00:53:21.168264 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:21.170465 kubelet[1936]: E0515 00:53:21.170438 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:21.170465 kubelet[1936]: E0515 00:53:21.170452 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:21.747594 kubelet[1936]: I0515 00:53:21.747548 1936 apiserver.go:52] "Watching apiserver" May 15 00:53:21.755134 kubelet[1936]: I0515 00:53:21.755113 1936 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 00:53:21.771804 kubelet[1936]: E0515 00:53:21.771776 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:21.772074 kubelet[1936]: E0515 00:53:21.772008 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:21.778290 kubelet[1936]: E0515 00:53:21.778241 1936 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 00:53:21.778400 kubelet[1936]: E0515 00:53:21.778375 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:21.790340 kubelet[1936]: I0515 00:53:21.790259 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.790244812 podStartE2EDuration="1.790244812s" podCreationTimestamp="2025-05-15 00:53:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:53:21.790147139 +0000 UTC m=+1.097968917" watchObservedRunningTime="2025-05-15 00:53:21.790244812 +0000 UTC m=+1.098066590" May 15 00:53:21.801042 kubelet[1936]: I0515 00:53:21.800988 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.800967956 podStartE2EDuration="1.800967956s" podCreationTimestamp="2025-05-15 00:53:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:53:21.79580979 +0000 UTC m=+1.103631568" watchObservedRunningTime="2025-05-15 00:53:21.800967956 +0000 UTC m=+1.108789734" May 15 00:53:21.807002 kubelet[1936]: I0515 00:53:21.806972 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.8069638220000002 podStartE2EDuration="1.806963822s" podCreationTimestamp="2025-05-15 00:53:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:53:21.801184161 +0000 UTC m=+1.109005929" watchObservedRunningTime="2025-05-15 00:53:21.806963822 +0000 UTC m=+1.114785600" May 15 00:53:22.772712 kubelet[1936]: E0515 00:53:22.772671 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:23.060000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:23.060000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fd17e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:23.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:23.061000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:23.061000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0011578a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:23.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:23.061000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:23.061000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0011578e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:23.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:23.067000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:53:23.067000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001080500 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:23.067000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:23.210000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 00:53:23.210000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001158480 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:53:23.210000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:53:23.297781 kubelet[1936]: E0515 00:53:23.297743 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:24.481505 kubelet[1936]: I0515 00:53:24.481461 1936 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 00:53:24.481949 env[1203]: time="2025-05-15T00:53:24.481831347Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 00:53:24.482143 kubelet[1936]: I0515 00:53:24.482085 1936 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 00:53:25.115485 kubelet[1936]: E0515 00:53:25.115438 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:25.268709 systemd[1]: Created slice kubepods-besteffort-pod0ebcee22_cedc_43e5_9de3_b97e7c8ff147.slice. May 15 00:53:25.288273 kubelet[1936]: I0515 00:53:25.288237 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0ebcee22-cedc-43e5-9de3-b97e7c8ff147-kube-proxy\") pod \"kube-proxy-hgvkm\" (UID: \"0ebcee22-cedc-43e5-9de3-b97e7c8ff147\") " pod="kube-system/kube-proxy-hgvkm" May 15 00:53:25.288273 kubelet[1936]: I0515 00:53:25.288272 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxrtc\" (UniqueName: \"kubernetes.io/projected/0ebcee22-cedc-43e5-9de3-b97e7c8ff147-kube-api-access-nxrtc\") pod \"kube-proxy-hgvkm\" (UID: \"0ebcee22-cedc-43e5-9de3-b97e7c8ff147\") " pod="kube-system/kube-proxy-hgvkm" May 15 00:53:25.288515 kubelet[1936]: I0515 00:53:25.288371 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0ebcee22-cedc-43e5-9de3-b97e7c8ff147-xtables-lock\") pod \"kube-proxy-hgvkm\" (UID: \"0ebcee22-cedc-43e5-9de3-b97e7c8ff147\") " pod="kube-system/kube-proxy-hgvkm" May 15 00:53:25.288515 kubelet[1936]: I0515 00:53:25.288404 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0ebcee22-cedc-43e5-9de3-b97e7c8ff147-lib-modules\") pod \"kube-proxy-hgvkm\" (UID: \"0ebcee22-cedc-43e5-9de3-b97e7c8ff147\") " pod="kube-system/kube-proxy-hgvkm" May 15 00:53:25.394733 kubelet[1936]: I0515 00:53:25.394610 1936 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 00:53:25.577504 kubelet[1936]: E0515 00:53:25.577448 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:25.578142 env[1203]: time="2025-05-15T00:53:25.578098317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hgvkm,Uid:0ebcee22-cedc-43e5-9de3-b97e7c8ff147,Namespace:kube-system,Attempt:0,}" May 15 00:53:25.767642 systemd[1]: Created slice kubepods-besteffort-pod7eef9463_288d_4e29_9c58_3478dbedd574.slice. May 15 00:53:25.790730 kubelet[1936]: I0515 00:53:25.790683 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4dthg\" (UniqueName: \"kubernetes.io/projected/7eef9463-288d-4e29-9c58-3478dbedd574-kube-api-access-4dthg\") pod \"tigera-operator-6f6897fdc5-s2kc2\" (UID: \"7eef9463-288d-4e29-9c58-3478dbedd574\") " pod="tigera-operator/tigera-operator-6f6897fdc5-s2kc2" May 15 00:53:25.790730 kubelet[1936]: I0515 00:53:25.790730 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7eef9463-288d-4e29-9c58-3478dbedd574-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-s2kc2\" (UID: \"7eef9463-288d-4e29-9c58-3478dbedd574\") " pod="tigera-operator/tigera-operator-6f6897fdc5-s2kc2" May 15 00:53:25.876153 env[1203]: time="2025-05-15T00:53:25.875826627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:25.876153 env[1203]: time="2025-05-15T00:53:25.875863328Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:25.876153 env[1203]: time="2025-05-15T00:53:25.875873669Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:25.876567 env[1203]: time="2025-05-15T00:53:25.876492659Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1689becf628c4e153df4592ab53cf1ea6b7654c791b7fde6a8f7a2d4f055e197 pid=2019 runtime=io.containerd.runc.v2 May 15 00:53:25.890043 systemd[1]: Started cri-containerd-1689becf628c4e153df4592ab53cf1ea6b7654c791b7fde6a8f7a2d4f055e197.scope. May 15 00:53:25.917583 kernel: kauditd_printk_skb: 265 callbacks suppressed May 15 00:53:25.917677 kernel: audit: type=1400 audit(1747270405.904:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.917699 kernel: audit: type=1400 audit(1747270405.904:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.917723 kernel: audit: type=1400 audit(1747270405.904:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.917740 kernel: audit: type=1400 audit(1747270405.904:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.924510 kernel: audit: type=1400 audit(1747270405.904:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.924558 kernel: audit: type=1400 audit(1747270405.904:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.927567 kernel: audit: type=1400 audit(1747270405.904:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.930625 kernel: audit: type=1400 audit(1747270405.904:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.933636 kernel: audit: type=1400 audit(1747270405.904:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.936717 kernel: audit: type=1400 audit(1747270405.907:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.936793 kubelet[1936]: E0515 00:53:25.934991 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:25.936846 env[1203]: time="2025-05-15T00:53:25.934334687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hgvkm,Uid:0ebcee22-cedc-43e5-9de3-b97e7c8ff147,Namespace:kube-system,Attempt:0,} returns sandbox id \"1689becf628c4e153df4592ab53cf1ea6b7654c791b7fde6a8f7a2d4f055e197\"" May 15 00:53:25.936985 env[1203]: time="2025-05-15T00:53:25.936896494Z" level=info msg="CreateContainer within sandbox \"1689becf628c4e153df4592ab53cf1ea6b7654c791b7fde6a8f7a2d4f055e197\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 00:53:25.907000 audit: BPF prog-id=106 op=LOAD May 15 00:53:25.908000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2019 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383962656366363238633465313533646634353932616235336366 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2019 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383962656366363238633465313533646634353932616235336366 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.908000 audit: BPF prog-id=107 op=LOAD May 15 00:53:25.908000 audit[2028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024eab0 items=0 ppid=2019 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383962656366363238633465313533646634353932616235336366 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.910000 audit: BPF prog-id=108 op=LOAD May 15 00:53:25.910000 audit[2028]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024eaf8 items=0 ppid=2019 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383962656366363238633465313533646634353932616235336366 May 15 00:53:25.916000 audit: BPF prog-id=108 op=UNLOAD May 15 00:53:25.916000 audit: BPF prog-id=107 op=UNLOAD May 15 00:53:25.916000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.916000 audit: BPF prog-id=109 op=LOAD May 15 00:53:25.916000 audit[2028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024ef08 items=0 ppid=2019 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136383962656366363238633465313533646634353932616235336366 May 15 00:53:25.957971 env[1203]: time="2025-05-15T00:53:25.957846038Z" level=info msg="CreateContainer within sandbox \"1689becf628c4e153df4592ab53cf1ea6b7654c791b7fde6a8f7a2d4f055e197\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e12b297e71305c358db747d1f0ce11a280556017c87d00ad17f692f0bd4aa7ee\"" May 15 00:53:25.959348 env[1203]: time="2025-05-15T00:53:25.959286950Z" level=info msg="StartContainer for \"e12b297e71305c358db747d1f0ce11a280556017c87d00ad17f692f0bd4aa7ee\"" May 15 00:53:25.970184 sudo[1337]: pam_unix(sudo:session): session closed for user root May 15 00:53:25.969000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:53:25.969000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:53:25.971740 sshd[1333]: pam_unix(sshd:session): session closed for user core May 15 00:53:25.971000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:25.971000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:25.974256 systemd[1]: sshd@6-10.0.0.92:22-10.0.0.1:49088.service: Deactivated successfully. May 15 00:53:25.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.92:22-10.0.0.1:49088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:25.974906 systemd[1]: session-7.scope: Deactivated successfully. May 15 00:53:25.975104 systemd[1]: session-7.scope: Consumed 3.897s CPU time. May 15 00:53:25.975541 systemd-logind[1193]: Session 7 logged out. Waiting for processes to exit. May 15 00:53:25.977334 systemd[1]: Started cri-containerd-e12b297e71305c358db747d1f0ce11a280556017c87d00ad17f692f0bd4aa7ee.scope. May 15 00:53:25.979716 systemd-logind[1193]: Removed session 7. May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1b2ef7d928 items=0 ppid=2019 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326232393765373133303563333538646237343764316630636531 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit: BPF prog-id=110 op=LOAD May 15 00:53:25.986000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002f5268 items=0 ppid=2019 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326232393765373133303563333538646237343764316630636531 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.986000 audit: BPF prog-id=111 op=LOAD May 15 00:53:25.986000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002f52b8 items=0 ppid=2019 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326232393765373133303563333538646237343764316630636531 May 15 00:53:25.987000 audit: BPF prog-id=111 op=UNLOAD May 15 00:53:25.987000 audit: BPF prog-id=110 op=UNLOAD May 15 00:53:25.987000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:25.987000 audit: BPF prog-id=112 op=LOAD May 15 00:53:25.987000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002f5348 items=0 ppid=2019 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:25.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326232393765373133303563333538646237343764316630636531 May 15 00:53:26.000222 env[1203]: time="2025-05-15T00:53:26.000136832Z" level=info msg="StartContainer for \"e12b297e71305c358db747d1f0ce11a280556017c87d00ad17f692f0bd4aa7ee\" returns successfully" May 15 00:53:26.070456 env[1203]: time="2025-05-15T00:53:26.070346278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-s2kc2,Uid:7eef9463-288d-4e29-9c58-3478dbedd574,Namespace:tigera-operator,Attempt:0,}" May 15 00:53:26.088342 env[1203]: time="2025-05-15T00:53:26.088261946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:26.088413 env[1203]: time="2025-05-15T00:53:26.088345316Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:26.088413 env[1203]: time="2025-05-15T00:53:26.088386205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:26.088601 env[1203]: time="2025-05-15T00:53:26.088574256Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21e04c3139d2b2dce46ff12bda197aeceb6773ac35c41631eac9263999f40b90 pid=2133 runtime=io.containerd.runc.v2 May 15 00:53:26.093000 audit[2153]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.093000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2715ffd0 a2=0 a3=7ffd2715ffbc items=0 ppid=2081 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:53:26.094000 audit[2154]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.094000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4572ec40 a2=0 a3=7ffc4572ec2c items=0 ppid=2081 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:53:26.095000 audit[2155]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.095000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce9285c70 a2=0 a3=7ffce9285c5c items=0 ppid=2081 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:53:26.096000 audit[2156]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.096000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2606d930 a2=0 a3=7ffd2606d91c items=0 ppid=2081 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:53:26.099000 audit[2161]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.099000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff723fe7c0 a2=0 a3=7fff723fe7ac items=0 ppid=2081 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:53:26.102109 systemd[1]: Started cri-containerd-21e04c3139d2b2dce46ff12bda197aeceb6773ac35c41631eac9263999f40b90.scope. May 15 00:53:26.101000 audit[2163]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.101000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6ad0b070 a2=0 a3=7ffd6ad0b05c items=0 ppid=2081 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:53:26.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit: BPF prog-id=113 op=LOAD May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653034633331333964326232646365343666663132626461313937 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653034633331333964326232646365343666663132626461313937 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit: BPF prog-id=114 op=LOAD May 15 00:53:26.110000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323c00 items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653034633331333964326232646365343666663132626461313937 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.110000 audit: BPF prog-id=115 op=LOAD May 15 00:53:26.110000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323c48 items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653034633331333964326232646365343666663132626461313937 May 15 00:53:26.110000 audit: BPF prog-id=115 op=UNLOAD May 15 00:53:26.110000 audit: BPF prog-id=114 op=UNLOAD May 15 00:53:26.111000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:26.111000 audit: BPF prog-id=116 op=LOAD May 15 00:53:26.111000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000400058 items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653034633331333964326232646365343666663132626461313937 May 15 00:53:26.132946 env[1203]: time="2025-05-15T00:53:26.132906353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-s2kc2,Uid:7eef9463-288d-4e29-9c58-3478dbedd574,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"21e04c3139d2b2dce46ff12bda197aeceb6773ac35c41631eac9263999f40b90\"" May 15 00:53:26.134732 env[1203]: time="2025-05-15T00:53:26.134686111Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 00:53:26.195000 audit[2179]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.195000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff91dfd8e0 a2=0 a3=7fff91dfd8cc items=0 ppid=2081 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:53:26.197000 audit[2181]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.197000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc5627e920 a2=0 a3=7ffc5627e90c items=0 ppid=2081 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 00:53:26.200000 audit[2184]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.200000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe5e0fa670 a2=0 a3=7ffe5e0fa65c items=0 ppid=2081 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 00:53:26.201000 audit[2185]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.201000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd16b0b890 a2=0 a3=7ffd16b0b87c items=0 ppid=2081 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:53:26.203000 audit[2187]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.203000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe96da7060 a2=0 a3=7ffe96da704c items=0 ppid=2081 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:53:26.204000 audit[2188]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.204000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe66dd3880 a2=0 a3=7ffe66dd386c items=0 ppid=2081 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:53:26.206000 audit[2190]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.206000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd48d36870 a2=0 a3=7ffd48d3685c items=0 ppid=2081 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:53:26.209000 audit[2193]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.209000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd44a3f20 a2=0 a3=7fffd44a3f0c items=0 ppid=2081 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 00:53:26.209000 audit[2194]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.209000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9e9d4a10 a2=0 a3=7ffd9e9d49fc items=0 ppid=2081 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:53:26.211000 audit[2196]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.211000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe81553820 a2=0 a3=7ffe8155380c items=0 ppid=2081 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:53:26.212000 audit[2197]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.212000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec54119f0 a2=0 a3=7ffec54119dc items=0 ppid=2081 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:53:26.214000 audit[2199]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.214000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdee1787b0 a2=0 a3=7ffdee17879c items=0 ppid=2081 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:53:26.217000 audit[2202]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.217000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffac355fb0 a2=0 a3=7fffac355f9c items=0 ppid=2081 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:53:26.219000 audit[2205]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.219000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe52640530 a2=0 a3=7ffe5264051c items=0 ppid=2081 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:53:26.220000 audit[2206]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.220000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2a7e6da0 a2=0 a3=7ffc2a7e6d8c items=0 ppid=2081 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:53:26.222000 audit[2208]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.222000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffefd3156c0 a2=0 a3=7ffefd3156ac items=0 ppid=2081 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:53:26.225000 audit[2211]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.225000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd31a4150 a2=0 a3=7ffdd31a413c items=0 ppid=2081 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:53:26.226000 audit[2212]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.226000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf57cf620 a2=0 a3=7ffdf57cf60c items=0 ppid=2081 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:53:26.227000 audit[2214]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:53:26.227000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc247e7b80 a2=0 a3=7ffc247e7b6c items=0 ppid=2081 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:53:26.246000 audit[2220]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:26.246000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcc54c42f0 a2=0 a3=7ffcc54c42dc items=0 ppid=2081 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:26.253000 audit[2220]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:26.253000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcc54c42f0 a2=0 a3=7ffcc54c42dc items=0 ppid=2081 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:26.254000 audit[2225]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.254000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc39a8c660 a2=0 a3=7ffc39a8c64c items=0 ppid=2081 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:53:26.256000 audit[2227]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.256000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4c5a55e0 a2=0 a3=7ffe4c5a55cc items=0 ppid=2081 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 00:53:26.259000 audit[2230]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.259000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff78449eb0 a2=0 a3=7fff78449e9c items=0 ppid=2081 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 00:53:26.260000 audit[2231]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.260000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd78490480 a2=0 a3=7ffd7849046c items=0 ppid=2081 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:53:26.262000 audit[2233]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.262000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6c5457b0 a2=0 a3=7ffc6c54579c items=0 ppid=2081 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:53:26.262000 audit[2234]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.262000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee71d71c0 a2=0 a3=7ffee71d71ac items=0 ppid=2081 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:53:26.264000 audit[2236]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.264000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd272b0df0 a2=0 a3=7ffd272b0ddc items=0 ppid=2081 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 00:53:26.267000 audit[2239]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.267000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcde7ab830 a2=0 a3=7ffcde7ab81c items=0 ppid=2081 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:53:26.268000 audit[2240]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.268000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfa487ed0 a2=0 a3=7ffdfa487ebc items=0 ppid=2081 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:53:26.269000 audit[2242]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.269000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc3535460 a2=0 a3=7ffcc353544c items=0 ppid=2081 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:53:26.270000 audit[2243]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.270000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0c085140 a2=0 a3=7ffe0c08512c items=0 ppid=2081 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:53:26.272000 audit[2245]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.272000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcba2a9f0 a2=0 a3=7ffdcba2a9dc items=0 ppid=2081 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:53:26.275000 audit[2248]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.275000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee683d3a0 a2=0 a3=7ffee683d38c items=0 ppid=2081 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:53:26.277000 audit[2251]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.277000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd6d6a710 a2=0 a3=7fffd6d6a6fc items=0 ppid=2081 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 00:53:26.278000 audit[2252]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.278000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd0b46240 a2=0 a3=7fffd0b4622c items=0 ppid=2081 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:53:26.280000 audit[2254]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.280000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffde6afbbf0 a2=0 a3=7ffde6afbbdc items=0 ppid=2081 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:53:26.282000 audit[2257]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.282000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdfd2d7170 a2=0 a3=7ffdfd2d715c items=0 ppid=2081 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:53:26.283000 audit[2258]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.283000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2e3d8220 a2=0 a3=7ffd2e3d820c items=0 ppid=2081 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:53:26.285000 audit[2260]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.285000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff5d947b40 a2=0 a3=7fff5d947b2c items=0 ppid=2081 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:53:26.286000 audit[2261]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.286000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd720589d0 a2=0 a3=7ffd720589bc items=0 ppid=2081 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:53:26.287000 audit[2263]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.287000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc358de4b0 a2=0 a3=7ffc358de49c items=0 ppid=2081 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:53:26.290000 audit[2266]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:53:26.290000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda28a9250 a2=0 a3=7ffda28a923c items=0 ppid=2081 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:53:26.292000 audit[2268]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:53:26.292000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe597503d0 a2=0 a3=7ffe597503bc items=0 ppid=2081 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.292000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:26.292000 audit[2268]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:53:26.292000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe597503d0 a2=0 a3=7ffe597503bc items=0 ppid=2081 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:26.292000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:26.780253 kubelet[1936]: E0515 00:53:26.780212 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:26.788511 kubelet[1936]: I0515 00:53:26.788476 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hgvkm" podStartSLOduration=1.788460186 podStartE2EDuration="1.788460186s" podCreationTimestamp="2025-05-15 00:53:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:53:26.788349203 +0000 UTC m=+6.096170971" watchObservedRunningTime="2025-05-15 00:53:26.788460186 +0000 UTC m=+6.096281964" May 15 00:53:27.217651 kubelet[1936]: E0515 00:53:27.217624 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:27.780974 kubelet[1936]: E0515 00:53:27.780763 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:28.217100 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2845232539.mount: Deactivated successfully. May 15 00:53:29.015387 env[1203]: time="2025-05-15T00:53:29.015328369Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:29.017446 env[1203]: time="2025-05-15T00:53:29.017404659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:29.019620 env[1203]: time="2025-05-15T00:53:29.019590659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:29.021809 env[1203]: time="2025-05-15T00:53:29.021759306Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:29.022324 env[1203]: time="2025-05-15T00:53:29.022291634Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 00:53:29.024948 env[1203]: time="2025-05-15T00:53:29.024899581Z" level=info msg="CreateContainer within sandbox \"21e04c3139d2b2dce46ff12bda197aeceb6773ac35c41631eac9263999f40b90\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 00:53:29.037575 env[1203]: time="2025-05-15T00:53:29.037517249Z" level=info msg="CreateContainer within sandbox \"21e04c3139d2b2dce46ff12bda197aeceb6773ac35c41631eac9263999f40b90\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f10b27a1ba563a1e95ac59c00d20baa43baaccdf2cb1448c07501426ffd6efc8\"" May 15 00:53:29.037957 env[1203]: time="2025-05-15T00:53:29.037928996Z" level=info msg="StartContainer for \"f10b27a1ba563a1e95ac59c00d20baa43baaccdf2cb1448c07501426ffd6efc8\"" May 15 00:53:29.057240 systemd[1]: Started cri-containerd-f10b27a1ba563a1e95ac59c00d20baa43baaccdf2cb1448c07501426ffd6efc8.scope. May 15 00:53:29.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit: BPF prog-id=117 op=LOAD May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2133 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:29.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631306232376131626135363361316539356163353963303064323062 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2133 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:29.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631306232376131626135363361316539356163353963303064323062 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit: BPF prog-id=118 op=LOAD May 15 00:53:29.068000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd40 items=0 ppid=2133 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:29.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631306232376131626135363361316539356163353963303064323062 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit: BPF prog-id=119 op=LOAD May 15 00:53:29.068000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd88 items=0 ppid=2133 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:29.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631306232376131626135363361316539356163353963303064323062 May 15 00:53:29.068000 audit: BPF prog-id=119 op=UNLOAD May 15 00:53:29.068000 audit: BPF prog-id=118 op=UNLOAD May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:29.068000 audit: BPF prog-id=120 op=LOAD May 15 00:53:29.068000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037c198 items=0 ppid=2133 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:29.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631306232376131626135363361316539356163353963303064323062 May 15 00:53:29.081954 env[1203]: time="2025-05-15T00:53:29.081898876Z" level=info msg="StartContainer for \"f10b27a1ba563a1e95ac59c00d20baa43baaccdf2cb1448c07501426ffd6efc8\" returns successfully" May 15 00:53:29.791712 kubelet[1936]: I0515 00:53:29.791541 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-s2kc2" podStartSLOduration=1.90263494 podStartE2EDuration="4.791510296s" podCreationTimestamp="2025-05-15 00:53:25 +0000 UTC" firstStartedPulling="2025-05-15 00:53:26.134101368 +0000 UTC m=+5.441923136" lastFinishedPulling="2025-05-15 00:53:29.022976714 +0000 UTC m=+8.330798492" observedRunningTime="2025-05-15 00:53:29.791389786 +0000 UTC m=+9.099211584" watchObservedRunningTime="2025-05-15 00:53:29.791510296 +0000 UTC m=+9.099332074" May 15 00:53:31.839942 kernel: kauditd_printk_skb: 362 callbacks suppressed May 15 00:53:31.840093 kernel: audit: type=1325 audit(1747270411.828:935): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.840115 kernel: audit: type=1300 audit(1747270411.828:935): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd42180c60 a2=0 a3=7ffd42180c4c items=0 ppid=2081 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.840137 kernel: audit: type=1327 audit(1747270411.828:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.828000 audit[2310]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.828000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd42180c60 a2=0 a3=7ffd42180c4c items=0 ppid=2081 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.848000 audit[2310]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.848000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd42180c60 a2=0 a3=0 items=0 ppid=2081 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.856176 kernel: audit: type=1325 audit(1747270411.848:936): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.856234 kernel: audit: type=1300 audit(1747270411.848:936): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd42180c60 a2=0 a3=0 items=0 ppid=2081 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.856262 kernel: audit: type=1327 audit(1747270411.848:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.862000 audit[2312]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.862000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc84fe29d0 a2=0 a3=7ffc84fe29bc items=0 ppid=2081 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.872488 kernel: audit: type=1325 audit(1747270411.862:937): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.872533 kernel: audit: type=1300 audit(1747270411.862:937): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc84fe29d0 a2=0 a3=7ffc84fe29bc items=0 ppid=2081 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.875006 kernel: audit: type=1327 audit(1747270411.862:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.875000 audit[2312]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.875000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc84fe29d0 a2=0 a3=0 items=0 ppid=2081 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:31.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:31.879937 kernel: audit: type=1325 audit(1747270411.875:938): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:31.988186 systemd[1]: Created slice kubepods-besteffort-pod983c51d3_9f55_4b5e_8107_8d2366068c9d.slice. May 15 00:53:31.997558 systemd[1]: Created slice kubepods-besteffort-pod1e06d30b_a82e_403a_a935_3079c2fba03c.slice. May 15 00:53:32.034012 kubelet[1936]: I0515 00:53:32.033966 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-log-dir\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034012 kubelet[1936]: I0515 00:53:32.034007 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-flexvol-driver-host\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034518 kubelet[1936]: I0515 00:53:32.034027 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhnsc\" (UniqueName: \"kubernetes.io/projected/1e06d30b-a82e-403a-a935-3079c2fba03c-kube-api-access-qhnsc\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034518 kubelet[1936]: I0515 00:53:32.034043 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/983c51d3-9f55-4b5e-8107-8d2366068c9d-tigera-ca-bundle\") pod \"calico-typha-64b4cc7f48-9hg8t\" (UID: \"983c51d3-9f55-4b5e-8107-8d2366068c9d\") " pod="calico-system/calico-typha-64b4cc7f48-9hg8t" May 15 00:53:32.034518 kubelet[1936]: I0515 00:53:32.034055 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-lib-calico\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034518 kubelet[1936]: I0515 00:53:32.034069 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-net-dir\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034518 kubelet[1936]: I0515 00:53:32.034096 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-xtables-lock\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034768 kubelet[1936]: I0515 00:53:32.034139 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-run-calico\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034768 kubelet[1936]: I0515 00:53:32.034161 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/983c51d3-9f55-4b5e-8107-8d2366068c9d-typha-certs\") pod \"calico-typha-64b4cc7f48-9hg8t\" (UID: \"983c51d3-9f55-4b5e-8107-8d2366068c9d\") " pod="calico-system/calico-typha-64b4cc7f48-9hg8t" May 15 00:53:32.034768 kubelet[1936]: I0515 00:53:32.034179 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e06d30b-a82e-403a-a935-3079c2fba03c-node-certs\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034768 kubelet[1936]: I0515 00:53:32.034192 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-policysync\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034768 kubelet[1936]: I0515 00:53:32.034208 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e06d30b-a82e-403a-a935-3079c2fba03c-tigera-ca-bundle\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034934 kubelet[1936]: I0515 00:53:32.034223 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-bin-dir\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034934 kubelet[1936]: I0515 00:53:32.034245 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-lib-modules\") pod \"calico-node-nzxp2\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " pod="calico-system/calico-node-nzxp2" May 15 00:53:32.034934 kubelet[1936]: I0515 00:53:32.034258 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-khbj5\" (UniqueName: \"kubernetes.io/projected/983c51d3-9f55-4b5e-8107-8d2366068c9d-kube-api-access-khbj5\") pod \"calico-typha-64b4cc7f48-9hg8t\" (UID: \"983c51d3-9f55-4b5e-8107-8d2366068c9d\") " pod="calico-system/calico-typha-64b4cc7f48-9hg8t" May 15 00:53:32.087195 kubelet[1936]: E0515 00:53:32.087139 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:32.135245 kubelet[1936]: I0515 00:53:32.135123 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d89698cf-ee3e-4bee-bff3-be4ff5bd14cc-socket-dir\") pod \"csi-node-driver-vztvt\" (UID: \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\") " pod="calico-system/csi-node-driver-vztvt" May 15 00:53:32.135573 kubelet[1936]: I0515 00:53:32.135541 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8wbf4\" (UniqueName: \"kubernetes.io/projected/d89698cf-ee3e-4bee-bff3-be4ff5bd14cc-kube-api-access-8wbf4\") pod \"csi-node-driver-vztvt\" (UID: \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\") " pod="calico-system/csi-node-driver-vztvt" May 15 00:53:32.136881 kubelet[1936]: I0515 00:53:32.136866 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d89698cf-ee3e-4bee-bff3-be4ff5bd14cc-varrun\") pod \"csi-node-driver-vztvt\" (UID: \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\") " pod="calico-system/csi-node-driver-vztvt" May 15 00:53:32.137267 kubelet[1936]: I0515 00:53:32.137240 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d89698cf-ee3e-4bee-bff3-be4ff5bd14cc-kubelet-dir\") pod \"csi-node-driver-vztvt\" (UID: \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\") " pod="calico-system/csi-node-driver-vztvt" May 15 00:53:32.137450 kubelet[1936]: I0515 00:53:32.137309 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d89698cf-ee3e-4bee-bff3-be4ff5bd14cc-registration-dir\") pod \"csi-node-driver-vztvt\" (UID: \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\") " pod="calico-system/csi-node-driver-vztvt" May 15 00:53:32.144188 kubelet[1936]: E0515 00:53:32.140436 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.144188 kubelet[1936]: W0515 00:53:32.140459 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.144188 kubelet[1936]: E0515 00:53:32.140480 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.146069 kubelet[1936]: E0515 00:53:32.146051 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.146195 kubelet[1936]: W0515 00:53:32.146180 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.146285 kubelet[1936]: E0515 00:53:32.146268 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.151122 kubelet[1936]: E0515 00:53:32.147882 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.151122 kubelet[1936]: W0515 00:53:32.147902 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.151122 kubelet[1936]: E0515 00:53:32.147933 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.151689 kubelet[1936]: E0515 00:53:32.151678 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.151763 kubelet[1936]: W0515 00:53:32.151748 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.151843 kubelet[1936]: E0515 00:53:32.151827 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.238123 kubelet[1936]: E0515 00:53:32.238081 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.238123 kubelet[1936]: W0515 00:53:32.238103 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.238123 kubelet[1936]: E0515 00:53:32.238121 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.238399 kubelet[1936]: E0515 00:53:32.238378 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.238399 kubelet[1936]: W0515 00:53:32.238389 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.238467 kubelet[1936]: E0515 00:53:32.238401 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.238722 kubelet[1936]: E0515 00:53:32.238684 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.238722 kubelet[1936]: W0515 00:53:32.238713 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.238795 kubelet[1936]: E0515 00:53:32.238741 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.238932 kubelet[1936]: E0515 00:53:32.238899 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.238932 kubelet[1936]: W0515 00:53:32.238910 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.238991 kubelet[1936]: E0515 00:53:32.238936 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.239131 kubelet[1936]: E0515 00:53:32.239111 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.239131 kubelet[1936]: W0515 00:53:32.239123 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.239184 kubelet[1936]: E0515 00:53:32.239136 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.239458 kubelet[1936]: E0515 00:53:32.239428 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.239458 kubelet[1936]: W0515 00:53:32.239453 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.239515 kubelet[1936]: E0515 00:53:32.239480 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.239667 kubelet[1936]: E0515 00:53:32.239655 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.239667 kubelet[1936]: W0515 00:53:32.239664 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.239737 kubelet[1936]: E0515 00:53:32.239689 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.239848 kubelet[1936]: E0515 00:53:32.239820 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.239848 kubelet[1936]: W0515 00:53:32.239830 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.239935 kubelet[1936]: E0515 00:53:32.239896 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.240030 kubelet[1936]: E0515 00:53:32.240000 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.240030 kubelet[1936]: W0515 00:53:32.240012 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.240030 kubelet[1936]: E0515 00:53:32.240024 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.240244 kubelet[1936]: E0515 00:53:32.240216 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.240244 kubelet[1936]: W0515 00:53:32.240226 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.240244 kubelet[1936]: E0515 00:53:32.240237 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.240416 kubelet[1936]: E0515 00:53:32.240394 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.240416 kubelet[1936]: W0515 00:53:32.240405 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.240416 kubelet[1936]: E0515 00:53:32.240414 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.240599 kubelet[1936]: E0515 00:53:32.240583 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.240599 kubelet[1936]: W0515 00:53:32.240595 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.240651 kubelet[1936]: E0515 00:53:32.240610 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.240838 kubelet[1936]: E0515 00:53:32.240820 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.240838 kubelet[1936]: W0515 00:53:32.240835 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.240909 kubelet[1936]: E0515 00:53:32.240851 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.241039 kubelet[1936]: E0515 00:53:32.241024 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.241039 kubelet[1936]: W0515 00:53:32.241035 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.241111 kubelet[1936]: E0515 00:53:32.241048 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.241216 kubelet[1936]: E0515 00:53:32.241203 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.241216 kubelet[1936]: W0515 00:53:32.241212 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.241265 kubelet[1936]: E0515 00:53:32.241240 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.241392 kubelet[1936]: E0515 00:53:32.241370 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.241392 kubelet[1936]: W0515 00:53:32.241384 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.241453 kubelet[1936]: E0515 00:53:32.241419 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.241554 kubelet[1936]: E0515 00:53:32.241542 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.241581 kubelet[1936]: W0515 00:53:32.241557 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.241581 kubelet[1936]: E0515 00:53:32.241570 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.241740 kubelet[1936]: E0515 00:53:32.241724 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.241740 kubelet[1936]: W0515 00:53:32.241735 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.241812 kubelet[1936]: E0515 00:53:32.241748 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.241897 kubelet[1936]: E0515 00:53:32.241883 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.241897 kubelet[1936]: W0515 00:53:32.241893 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.241965 kubelet[1936]: E0515 00:53:32.241905 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.242072 kubelet[1936]: E0515 00:53:32.242057 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.242072 kubelet[1936]: W0515 00:53:32.242067 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.242144 kubelet[1936]: E0515 00:53:32.242079 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.242261 kubelet[1936]: E0515 00:53:32.242247 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.242261 kubelet[1936]: W0515 00:53:32.242256 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.242328 kubelet[1936]: E0515 00:53:32.242267 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.242454 kubelet[1936]: E0515 00:53:32.242441 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.242454 kubelet[1936]: W0515 00:53:32.242451 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.242508 kubelet[1936]: E0515 00:53:32.242462 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.242626 kubelet[1936]: E0515 00:53:32.242613 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.242626 kubelet[1936]: W0515 00:53:32.242624 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.242674 kubelet[1936]: E0515 00:53:32.242636 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.242814 kubelet[1936]: E0515 00:53:32.242800 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.242814 kubelet[1936]: W0515 00:53:32.242810 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.242885 kubelet[1936]: E0515 00:53:32.242834 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.243012 kubelet[1936]: E0515 00:53:32.242996 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.243012 kubelet[1936]: W0515 00:53:32.243007 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.243012 kubelet[1936]: E0515 00:53:32.243014 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.250438 kubelet[1936]: E0515 00:53:32.250413 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:32.250438 kubelet[1936]: W0515 00:53:32.250425 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:32.250438 kubelet[1936]: E0515 00:53:32.250433 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:32.293236 kubelet[1936]: E0515 00:53:32.293181 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:32.293853 env[1203]: time="2025-05-15T00:53:32.293799031Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64b4cc7f48-9hg8t,Uid:983c51d3-9f55-4b5e-8107-8d2366068c9d,Namespace:calico-system,Attempt:0,}" May 15 00:53:32.300036 kubelet[1936]: E0515 00:53:32.300003 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:32.300438 env[1203]: time="2025-05-15T00:53:32.300403317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nzxp2,Uid:1e06d30b-a82e-403a-a935-3079c2fba03c,Namespace:calico-system,Attempt:0,}" May 15 00:53:32.347969 env[1203]: time="2025-05-15T00:53:32.347859549Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:32.347969 env[1203]: time="2025-05-15T00:53:32.347932558Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:32.347969 env[1203]: time="2025-05-15T00:53:32.347947205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:32.348194 env[1203]: time="2025-05-15T00:53:32.348110597Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc962ca29038325d65fc739352ab75acf1bae10ed726d7aad122d9dc92c49218 pid=2355 runtime=io.containerd.runc.v2 May 15 00:53:32.354324 env[1203]: time="2025-05-15T00:53:32.354263644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:53:32.354324 env[1203]: time="2025-05-15T00:53:32.354290715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:53:32.354324 env[1203]: time="2025-05-15T00:53:32.354300774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:53:32.354586 env[1203]: time="2025-05-15T00:53:32.354431253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55 pid=2378 runtime=io.containerd.runc.v2 May 15 00:53:32.359726 systemd[1]: Started cri-containerd-bc962ca29038325d65fc739352ab75acf1bae10ed726d7aad122d9dc92c49218.scope. May 15 00:53:32.366311 systemd[1]: Started cri-containerd-e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55.scope. May 15 00:53:32.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit: BPF prog-id=121 op=LOAD May 15 00:53:32.373000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393632636132393033383332356436356663373339333532616237 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393632636132393033383332356436356663373339333532616237 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.373000 audit: BPF prog-id=122 op=LOAD May 15 00:53:32.373000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000381ea0 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393632636132393033383332356436356663373339333532616237 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit: BPF prog-id=123 op=LOAD May 15 00:53:32.374000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381ee8 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393632636132393033383332356436356663373339333532616237 May 15 00:53:32.374000 audit: BPF prog-id=123 op=UNLOAD May 15 00:53:32.374000 audit: BPF prog-id=122 op=UNLOAD May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.374000 audit: BPF prog-id=124 op=LOAD May 15 00:53:32.374000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f62f8 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393632636132393033383332356436356663373339333532616237 May 15 00:53:32.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit: BPF prog-id=125 op=LOAD May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2378 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383333623938643966333132626437623134353636306134306135 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2378 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383333623938643966333132626437623134353636306134306135 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit: BPF prog-id=126 op=LOAD May 15 00:53:32.378000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038b080 items=0 ppid=2378 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383333623938643966333132626437623134353636306134306135 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit: BPF prog-id=127 op=LOAD May 15 00:53:32.378000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038b0c8 items=0 ppid=2378 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383333623938643966333132626437623134353636306134306135 May 15 00:53:32.378000 audit: BPF prog-id=127 op=UNLOAD May 15 00:53:32.378000 audit: BPF prog-id=126 op=UNLOAD May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:32.378000 audit: BPF prog-id=128 op=LOAD May 15 00:53:32.378000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038b4d8 items=0 ppid=2378 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383333623938643966333132626437623134353636306134306135 May 15 00:53:32.402679 env[1203]: time="2025-05-15T00:53:32.399725615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nzxp2,Uid:1e06d30b-a82e-403a-a935-3079c2fba03c,Namespace:calico-system,Attempt:0,} returns sandbox id \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\"" May 15 00:53:32.402679 env[1203]: time="2025-05-15T00:53:32.401263836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 00:53:32.404105 kubelet[1936]: E0515 00:53:32.400317 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:32.408342 env[1203]: time="2025-05-15T00:53:32.408291239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64b4cc7f48-9hg8t,Uid:983c51d3-9f55-4b5e-8107-8d2366068c9d,Namespace:calico-system,Attempt:0,} returns sandbox id \"bc962ca29038325d65fc739352ab75acf1bae10ed726d7aad122d9dc92c49218\"" May 15 00:53:32.408784 kubelet[1936]: E0515 00:53:32.408757 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:32.885000 audit[2430]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:32.885000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdb997f020 a2=0 a3=7ffdb997f00c items=0 ppid=2081 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:32.892000 audit[2430]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:32.892000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb997f020 a2=0 a3=0 items=0 ppid=2081 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:32.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:33.301620 kubelet[1936]: E0515 00:53:33.301587 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:33.332769 kubelet[1936]: E0515 00:53:33.332667 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:33.332769 kubelet[1936]: W0515 00:53:33.332688 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:33.332769 kubelet[1936]: E0515 00:53:33.332704 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:33.332991 kubelet[1936]: E0515 00:53:33.332941 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:33.332991 kubelet[1936]: W0515 00:53:33.332952 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:33.332991 kubelet[1936]: E0515 00:53:33.332964 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:33.333195 kubelet[1936]: E0515 00:53:33.333169 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:33.333195 kubelet[1936]: W0515 00:53:33.333180 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:33.333195 kubelet[1936]: E0515 00:53:33.333189 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:33.333507 kubelet[1936]: E0515 00:53:33.333473 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:33.333571 kubelet[1936]: W0515 00:53:33.333504 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:33.333571 kubelet[1936]: E0515 00:53:33.333533 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:33.333861 kubelet[1936]: E0515 00:53:33.333842 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:53:33.333861 kubelet[1936]: W0515 00:53:33.333857 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:53:33.333963 kubelet[1936]: E0515 00:53:33.333868 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:53:33.721854 env[1203]: time="2025-05-15T00:53:33.721797846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:33.727970 env[1203]: time="2025-05-15T00:53:33.727933709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:33.729653 env[1203]: time="2025-05-15T00:53:33.729601514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:33.731268 env[1203]: time="2025-05-15T00:53:33.731210056Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:33.731660 env[1203]: time="2025-05-15T00:53:33.731627241Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 00:53:33.733248 env[1203]: time="2025-05-15T00:53:33.733214012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 00:53:33.734051 env[1203]: time="2025-05-15T00:53:33.733996672Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:53:33.762006 env[1203]: time="2025-05-15T00:53:33.761957898Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317\"" May 15 00:53:33.762506 env[1203]: time="2025-05-15T00:53:33.762476715Z" level=info msg="StartContainer for \"023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317\"" May 15 00:53:33.763967 kubelet[1936]: E0515 00:53:33.763900 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:33.781237 systemd[1]: Started cri-containerd-023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317.scope. May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f32de8f0d88 items=0 ppid=2378 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:33.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032336330626663363636343233393739396537326630353434633332 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit: BPF prog-id=129 op=LOAD May 15 00:53:33.793000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000094898 items=0 ppid=2378 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:33.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032336330626663363636343233393739396537326630353434633332 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit: BPF prog-id=130 op=LOAD May 15 00:53:33.793000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000948e8 items=0 ppid=2378 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:33.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032336330626663363636343233393739396537326630353434633332 May 15 00:53:33.793000 audit: BPF prog-id=130 op=UNLOAD May 15 00:53:33.793000 audit: BPF prog-id=129 op=UNLOAD May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:33.793000 audit: BPF prog-id=131 op=LOAD May 15 00:53:33.793000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000094978 items=0 ppid=2378 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:33.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032336330626663363636343233393739396537326630353434633332 May 15 00:53:33.807052 env[1203]: time="2025-05-15T00:53:33.807008751Z" level=info msg="StartContainer for \"023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317\" returns successfully" May 15 00:53:33.816936 systemd[1]: cri-containerd-023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317.scope: Deactivated successfully. May 15 00:53:33.822000 audit: BPF prog-id=131 op=UNLOAD May 15 00:53:34.051852 env[1203]: time="2025-05-15T00:53:34.051727794Z" level=info msg="shim disconnected" id=023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317 May 15 00:53:34.051852 env[1203]: time="2025-05-15T00:53:34.051771147Z" level=warning msg="cleaning up after shim disconnected" id=023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317 namespace=k8s.io May 15 00:53:34.051852 env[1203]: time="2025-05-15T00:53:34.051781377Z" level=info msg="cleaning up dead shim" May 15 00:53:34.058683 env[1203]: time="2025-05-15T00:53:34.058624754Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:53:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2482 runtime=io.containerd.runc.v2\n" May 15 00:53:34.142723 systemd[1]: run-containerd-runc-k8s.io-023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317-runc.f53iY5.mount: Deactivated successfully. May 15 00:53:34.142816 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317-rootfs.mount: Deactivated successfully. May 15 00:53:34.797902 kubelet[1936]: E0515 00:53:34.797873 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:35.120138 kubelet[1936]: E0515 00:53:35.120019 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:35.764673 kubelet[1936]: E0515 00:53:35.764620 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:36.207664 update_engine[1197]: I0515 00:53:36.207612 1197 update_attempter.cc:509] Updating boot flags... May 15 00:53:37.048937 env[1203]: time="2025-05-15T00:53:37.048675541Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:37.055511 env[1203]: time="2025-05-15T00:53:37.055435118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:37.058586 env[1203]: time="2025-05-15T00:53:37.058540069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:37.061205 env[1203]: time="2025-05-15T00:53:37.060695630Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:37.061205 env[1203]: time="2025-05-15T00:53:37.061021869Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 00:53:37.062431 env[1203]: time="2025-05-15T00:53:37.062156601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 00:53:37.069524 env[1203]: time="2025-05-15T00:53:37.067884921Z" level=info msg="CreateContainer within sandbox \"bc962ca29038325d65fc739352ab75acf1bae10ed726d7aad122d9dc92c49218\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 00:53:37.086053 env[1203]: time="2025-05-15T00:53:37.085991489Z" level=info msg="CreateContainer within sandbox \"bc962ca29038325d65fc739352ab75acf1bae10ed726d7aad122d9dc92c49218\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6aec1d98b1b7cdb00dc65d0c305c1afc249718c199e0d086e53669847a3b10b3\"" May 15 00:53:37.086838 env[1203]: time="2025-05-15T00:53:37.086678282Z" level=info msg="StartContainer for \"6aec1d98b1b7cdb00dc65d0c305c1afc249718c199e0d086e53669847a3b10b3\"" May 15 00:53:37.105668 systemd[1]: Started cri-containerd-6aec1d98b1b7cdb00dc65d0c305c1afc249718c199e0d086e53669847a3b10b3.scope. May 15 00:53:37.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.121078 kernel: kauditd_printk_skb: 166 callbacks suppressed May 15 00:53:37.121126 kernel: audit: type=1400 audit(1747270417.118:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126942 kernel: audit: type=1400 audit(1747270417.118:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126987 kernel: audit: type=1400 audit(1747270417.118:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.129839 kernel: audit: type=1400 audit(1747270417.118:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.135749 kernel: audit: type=1400 audit(1747270417.118:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.135792 kernel: audit: type=1400 audit(1747270417.118:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.141992 kernel: audit: type=1400 audit(1747270417.118:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.145542 kernel: audit: type=1400 audit(1747270417.118:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.149151 kernel: audit: type=1400 audit(1747270417.118:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.152383 kernel: audit: type=1400 audit(1747270417.119:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.119000 audit: BPF prog-id=132 op=LOAD May 15 00:53:37.120000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2355 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661656331643938623162376364623030646336356430633330356331 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2355 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661656331643938623162376364623030646336356430633330356331 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.120000 audit: BPF prog-id=133 op=LOAD May 15 00:53:37.120000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000253d10 items=0 ppid=2355 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661656331643938623162376364623030646336356430633330356331 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.126000 audit: BPF prog-id=134 op=LOAD May 15 00:53:37.126000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000253d58 items=0 ppid=2355 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661656331643938623162376364623030646336356430633330356331 May 15 00:53:37.131000 audit: BPF prog-id=134 op=UNLOAD May 15 00:53:37.131000 audit: BPF prog-id=133 op=UNLOAD May 15 00:53:37.131000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:37.131000 audit: BPF prog-id=135 op=LOAD May 15 00:53:37.131000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce168 items=0 ppid=2355 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661656331643938623162376364623030646336356430633330356331 May 15 00:53:37.219119 env[1203]: time="2025-05-15T00:53:37.219063643Z" level=info msg="StartContainer for \"6aec1d98b1b7cdb00dc65d0c305c1afc249718c199e0d086e53669847a3b10b3\" returns successfully" May 15 00:53:37.764401 kubelet[1936]: E0515 00:53:37.764357 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:37.803747 kubelet[1936]: E0515 00:53:37.803707 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:37.811828 kubelet[1936]: I0515 00:53:37.811760 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-64b4cc7f48-9hg8t" podStartSLOduration=2.159086538 podStartE2EDuration="6.811747167s" podCreationTimestamp="2025-05-15 00:53:31 +0000 UTC" firstStartedPulling="2025-05-15 00:53:32.409340558 +0000 UTC m=+11.717162336" lastFinishedPulling="2025-05-15 00:53:37.062001187 +0000 UTC m=+16.369822965" observedRunningTime="2025-05-15 00:53:37.811213194 +0000 UTC m=+17.119034972" watchObservedRunningTime="2025-05-15 00:53:37.811747167 +0000 UTC m=+17.119568945" May 15 00:53:37.855000 audit[2557]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:37.855000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec86cc6d0 a2=0 a3=7ffec86cc6bc items=0 ppid=2081 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.855000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:37.869000 audit[2557]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:53:37.869000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffec86cc6d0 a2=0 a3=7ffec86cc6bc items=0 ppid=2081 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:37.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:53:38.804451 kubelet[1936]: E0515 00:53:38.804405 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:39.764423 kubelet[1936]: E0515 00:53:39.764379 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:39.805456 kubelet[1936]: E0515 00:53:39.805433 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:41.764440 kubelet[1936]: E0515 00:53:41.764391 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:43.765028 kubelet[1936]: E0515 00:53:43.764963 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:45.613399 kernel: kauditd_printk_skb: 53 callbacks suppressed May 15 00:53:45.613519 kernel: audit: type=1130 audit(1747270425.608:1004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.92:22-10.0.0.1:42272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:45.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.92:22-10.0.0.1:42272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:45.608936 systemd[1]: Started sshd@7-10.0.0.92:22-10.0.0.1:42272.service. May 15 00:53:45.645000 audit[2561]: USER_ACCT pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.650479 sshd[2561]: Accepted publickey for core from 10.0.0.1 port 42272 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:53:45.649000 audit[2561]: CRED_ACQ pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.650939 sshd[2561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:53:45.654322 kernel: audit: type=1101 audit(1747270425.645:1005): pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.654382 kernel: audit: type=1103 audit(1747270425.649:1006): pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.654414 kernel: audit: type=1006 audit(1747270425.649:1007): pid=2561 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 15 00:53:45.655535 systemd[1]: Started session-8.scope. May 15 00:53:45.655990 systemd-logind[1193]: New session 8 of user core. May 15 00:53:45.656521 kernel: audit: type=1300 audit(1747270425.649:1007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c560b30 a2=3 a3=0 items=0 ppid=1 pid=2561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:45.649000 audit[2561]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c560b30 a2=3 a3=0 items=0 ppid=1 pid=2561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:45.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:53:45.661825 kernel: audit: type=1327 audit(1747270425.649:1007): proctitle=737368643A20636F7265205B707269765D May 15 00:53:45.661872 kernel: audit: type=1105 audit(1747270425.660:1008): pid=2561 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.660000 audit[2561]: USER_START pid=2561 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.661000 audit[2563]: CRED_ACQ pid=2563 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.669881 kernel: audit: type=1103 audit(1747270425.661:1009): pid=2563 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.764504 kubelet[1936]: E0515 00:53:45.764198 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:45.961999 env[1203]: time="2025-05-15T00:53:45.961943668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:45.963970 env[1203]: time="2025-05-15T00:53:45.963904341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:45.965486 env[1203]: time="2025-05-15T00:53:45.965455000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:45.967189 env[1203]: time="2025-05-15T00:53:45.967157886Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:45.967525 env[1203]: time="2025-05-15T00:53:45.967484243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 00:53:45.970073 env[1203]: time="2025-05-15T00:53:45.970039389Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:53:45.973247 sshd[2561]: pam_unix(sshd:session): session closed for user core May 15 00:53:45.973000 audit[2561]: USER_END pid=2561 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.976033 systemd[1]: sshd@7-10.0.0.92:22-10.0.0.1:42272.service: Deactivated successfully. May 15 00:53:45.977041 systemd[1]: session-8.scope: Deactivated successfully. May 15 00:53:45.973000 audit[2561]: CRED_DISP pid=2561 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.979673 systemd-logind[1193]: Session 8 logged out. Waiting for processes to exit. May 15 00:53:45.980542 systemd-logind[1193]: Removed session 8. May 15 00:53:45.982876 kernel: audit: type=1106 audit(1747270425.973:1010): pid=2561 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.982971 kernel: audit: type=1104 audit(1747270425.973:1011): pid=2561 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:45.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.92:22-10.0.0.1:42272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:45.990509 env[1203]: time="2025-05-15T00:53:45.990452063Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47\"" May 15 00:53:45.991061 env[1203]: time="2025-05-15T00:53:45.991033059Z" level=info msg="StartContainer for \"d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47\"" May 15 00:53:46.008687 systemd[1]: run-containerd-runc-k8s.io-d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47-runc.5x70ZP.mount: Deactivated successfully. May 15 00:53:46.014773 systemd[1]: Started cri-containerd-d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47.scope. May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb2123521a8 items=0 ppid=2378 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:46.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432356331613632636338386539343939323261363539323665363238 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit: BPF prog-id=136 op=LOAD May 15 00:53:46.029000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fdcc8 items=0 ppid=2378 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:46.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432356331613632636338386539343939323261363539323665363238 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit: BPF prog-id=137 op=LOAD May 15 00:53:46.029000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fdd18 items=0 ppid=2378 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:46.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432356331613632636338386539343939323261363539323665363238 May 15 00:53:46.029000 audit: BPF prog-id=137 op=UNLOAD May 15 00:53:46.029000 audit: BPF prog-id=136 op=UNLOAD May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:46.029000 audit: BPF prog-id=138 op=LOAD May 15 00:53:46.029000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fdda8 items=0 ppid=2378 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:46.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432356331613632636338386539343939323261363539323665363238 May 15 00:53:46.075694 env[1203]: time="2025-05-15T00:53:46.075624688Z" level=info msg="StartContainer for \"d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47\" returns successfully" May 15 00:53:46.822967 kubelet[1936]: E0515 00:53:46.822925 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:46.852085 env[1203]: time="2025-05-15T00:53:46.852026307Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:53:46.854034 systemd[1]: cri-containerd-d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47.scope: Deactivated successfully. May 15 00:53:46.858000 audit: BPF prog-id=138 op=UNLOAD May 15 00:53:46.862326 kubelet[1936]: I0515 00:53:46.862299 1936 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 00:53:46.886640 systemd[1]: Created slice kubepods-burstable-pod514e78d1_5d35_4539_8295_ce066920cfd6.slice. May 15 00:53:46.892396 systemd[1]: Created slice kubepods-besteffort-pod4cd3b8f2_79a6_432c_85dc_154ddf0fc558.slice. May 15 00:53:46.903541 systemd[1]: Created slice kubepods-burstable-podca5d6b78_8a64_4987_912e_8674e449ef30.slice. May 15 00:53:46.906766 systemd[1]: Created slice kubepods-besteffort-podb6b6552b_76ab_48e5_ad1c_6f738c64971c.slice. May 15 00:53:46.912197 systemd[1]: Created slice kubepods-besteffort-pod89e2d280_2615_4ec8_8862_59855f998485.slice. May 15 00:53:46.946719 kubelet[1936]: I0515 00:53:46.946672 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bvbzg\" (UniqueName: \"kubernetes.io/projected/514e78d1-5d35-4539-8295-ce066920cfd6-kube-api-access-bvbzg\") pod \"coredns-6f6b679f8f-67h7f\" (UID: \"514e78d1-5d35-4539-8295-ce066920cfd6\") " pod="kube-system/coredns-6f6b679f8f-67h7f" May 15 00:53:46.946719 kubelet[1936]: I0515 00:53:46.946715 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kx9wr\" (UniqueName: \"kubernetes.io/projected/ca5d6b78-8a64-4987-912e-8674e449ef30-kube-api-access-kx9wr\") pod \"coredns-6f6b679f8f-tw99x\" (UID: \"ca5d6b78-8a64-4987-912e-8674e449ef30\") " pod="kube-system/coredns-6f6b679f8f-tw99x" May 15 00:53:46.946981 kubelet[1936]: I0515 00:53:46.946773 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ca5d6b78-8a64-4987-912e-8674e449ef30-config-volume\") pod \"coredns-6f6b679f8f-tw99x\" (UID: \"ca5d6b78-8a64-4987-912e-8674e449ef30\") " pod="kube-system/coredns-6f6b679f8f-tw99x" May 15 00:53:46.946981 kubelet[1936]: I0515 00:53:46.946793 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4cd3b8f2-79a6-432c-85dc-154ddf0fc558-calico-apiserver-certs\") pod \"calico-apiserver-77c7f9db84-xznmm\" (UID: \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\") " pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" May 15 00:53:46.946981 kubelet[1936]: I0515 00:53:46.946807 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-99f4c\" (UniqueName: \"kubernetes.io/projected/4cd3b8f2-79a6-432c-85dc-154ddf0fc558-kube-api-access-99f4c\") pod \"calico-apiserver-77c7f9db84-xznmm\" (UID: \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\") " pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" May 15 00:53:46.946981 kubelet[1936]: I0515 00:53:46.946821 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b6b6552b-76ab-48e5-ad1c-6f738c64971c-tigera-ca-bundle\") pod \"calico-kube-controllers-55b8f5d494-8w5fd\" (UID: \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\") " pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" May 15 00:53:46.946981 kubelet[1936]: I0515 00:53:46.946841 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9pxjf\" (UniqueName: \"kubernetes.io/projected/b6b6552b-76ab-48e5-ad1c-6f738c64971c-kube-api-access-9pxjf\") pod \"calico-kube-controllers-55b8f5d494-8w5fd\" (UID: \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\") " pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" May 15 00:53:46.947106 kubelet[1936]: I0515 00:53:46.946859 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/89e2d280-2615-4ec8-8862-59855f998485-calico-apiserver-certs\") pod \"calico-apiserver-77c7f9db84-gw7kn\" (UID: \"89e2d280-2615-4ec8-8862-59855f998485\") " pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" May 15 00:53:46.947106 kubelet[1936]: I0515 00:53:46.946874 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/514e78d1-5d35-4539-8295-ce066920cfd6-config-volume\") pod \"coredns-6f6b679f8f-67h7f\" (UID: \"514e78d1-5d35-4539-8295-ce066920cfd6\") " pod="kube-system/coredns-6f6b679f8f-67h7f" May 15 00:53:46.947106 kubelet[1936]: I0515 00:53:46.946888 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndhxk\" (UniqueName: \"kubernetes.io/projected/89e2d280-2615-4ec8-8862-59855f998485-kube-api-access-ndhxk\") pod \"calico-apiserver-77c7f9db84-gw7kn\" (UID: \"89e2d280-2615-4ec8-8862-59855f998485\") " pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" May 15 00:53:46.986334 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47-rootfs.mount: Deactivated successfully. May 15 00:53:47.085606 env[1203]: time="2025-05-15T00:53:47.082579566Z" level=info msg="shim disconnected" id=d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47 May 15 00:53:47.085606 env[1203]: time="2025-05-15T00:53:47.082640471Z" level=warning msg="cleaning up after shim disconnected" id=d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47 namespace=k8s.io May 15 00:53:47.085606 env[1203]: time="2025-05-15T00:53:47.082652083Z" level=info msg="cleaning up dead shim" May 15 00:53:47.090551 env[1203]: time="2025-05-15T00:53:47.090492919Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:53:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2630 runtime=io.containerd.runc.v2\n" May 15 00:53:47.207561 kubelet[1936]: E0515 00:53:47.207510 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:47.208449 env[1203]: time="2025-05-15T00:53:47.208383355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-67h7f,Uid:514e78d1-5d35-4539-8295-ce066920cfd6,Namespace:kube-system,Attempt:0,}" May 15 00:53:47.209641 kubelet[1936]: E0515 00:53:47.209606 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:47.210603 env[1203]: time="2025-05-15T00:53:47.210567958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b8f5d494-8w5fd,Uid:b6b6552b-76ab-48e5-ad1c-6f738c64971c,Namespace:calico-system,Attempt:0,}" May 15 00:53:47.211635 env[1203]: time="2025-05-15T00:53:47.211528400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tw99x,Uid:ca5d6b78-8a64-4987-912e-8674e449ef30,Namespace:kube-system,Attempt:0,}" May 15 00:53:47.211737 env[1203]: time="2025-05-15T00:53:47.211689104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-xznmm,Uid:4cd3b8f2-79a6-432c-85dc-154ddf0fc558,Namespace:calico-apiserver,Attempt:0,}" May 15 00:53:47.215148 env[1203]: time="2025-05-15T00:53:47.215089581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-gw7kn,Uid:89e2d280-2615-4ec8-8862-59855f998485,Namespace:calico-apiserver,Attempt:0,}" May 15 00:53:47.334076 env[1203]: time="2025-05-15T00:53:47.333992115Z" level=error msg="Failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.334429 env[1203]: time="2025-05-15T00:53:47.334394756Z" level=error msg="encountered an error cleaning up failed sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.334481 env[1203]: time="2025-05-15T00:53:47.334451112Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-67h7f,Uid:514e78d1-5d35-4539-8295-ce066920cfd6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.336229 kubelet[1936]: E0515 00:53:47.336121 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.336229 kubelet[1936]: E0515 00:53:47.336198 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-67h7f" May 15 00:53:47.337220 kubelet[1936]: E0515 00:53:47.337191 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-67h7f" May 15 00:53:47.338319 kubelet[1936]: E0515 00:53:47.338192 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-67h7f_kube-system(514e78d1-5d35-4539-8295-ce066920cfd6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-67h7f_kube-system(514e78d1-5d35-4539-8295-ce066920cfd6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-67h7f" podUID="514e78d1-5d35-4539-8295-ce066920cfd6" May 15 00:53:47.340579 env[1203]: time="2025-05-15T00:53:47.340522650Z" level=error msg="Failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.341149 env[1203]: time="2025-05-15T00:53:47.341090782Z" level=error msg="encountered an error cleaning up failed sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.341204 env[1203]: time="2025-05-15T00:53:47.341171094Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-xznmm,Uid:4cd3b8f2-79a6-432c-85dc-154ddf0fc558,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.341410 kubelet[1936]: E0515 00:53:47.341375 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.341471 kubelet[1936]: E0515 00:53:47.341428 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" May 15 00:53:47.341471 kubelet[1936]: E0515 00:53:47.341446 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" May 15 00:53:47.341547 kubelet[1936]: E0515 00:53:47.341488 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-77c7f9db84-xznmm_calico-apiserver(4cd3b8f2-79a6-432c-85dc-154ddf0fc558)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-77c7f9db84-xznmm_calico-apiserver(4cd3b8f2-79a6-432c-85dc-154ddf0fc558)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" podUID="4cd3b8f2-79a6-432c-85dc-154ddf0fc558" May 15 00:53:47.341709 env[1203]: time="2025-05-15T00:53:47.341677519Z" level=error msg="Failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.342293 env[1203]: time="2025-05-15T00:53:47.342260409Z" level=error msg="encountered an error cleaning up failed sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.342445 env[1203]: time="2025-05-15T00:53:47.342408349Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b8f5d494-8w5fd,Uid:b6b6552b-76ab-48e5-ad1c-6f738c64971c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.342874 kubelet[1936]: E0515 00:53:47.342694 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.342874 kubelet[1936]: E0515 00:53:47.342773 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" May 15 00:53:47.342874 kubelet[1936]: E0515 00:53:47.342792 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" May 15 00:53:47.342990 kubelet[1936]: E0515 00:53:47.342828 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55b8f5d494-8w5fd_calico-system(b6b6552b-76ab-48e5-ad1c-6f738c64971c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55b8f5d494-8w5fd_calico-system(b6b6552b-76ab-48e5-ad1c-6f738c64971c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" podUID="b6b6552b-76ab-48e5-ad1c-6f738c64971c" May 15 00:53:47.368364 env[1203]: time="2025-05-15T00:53:47.368282366Z" level=error msg="Failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.368953 env[1203]: time="2025-05-15T00:53:47.368882309Z" level=error msg="encountered an error cleaning up failed sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.368953 env[1203]: time="2025-05-15T00:53:47.368949545Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tw99x,Uid:ca5d6b78-8a64-4987-912e-8674e449ef30,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.369544 kubelet[1936]: E0515 00:53:47.369488 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.369623 kubelet[1936]: E0515 00:53:47.369559 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-tw99x" May 15 00:53:47.369623 kubelet[1936]: E0515 00:53:47.369579 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-tw99x" May 15 00:53:47.371061 kubelet[1936]: E0515 00:53:47.369659 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-tw99x_kube-system(ca5d6b78-8a64-4987-912e-8674e449ef30)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-tw99x_kube-system(ca5d6b78-8a64-4987-912e-8674e449ef30)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tw99x" podUID="ca5d6b78-8a64-4987-912e-8674e449ef30" May 15 00:53:47.372745 env[1203]: time="2025-05-15T00:53:47.372688852Z" level=error msg="Failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.373065 env[1203]: time="2025-05-15T00:53:47.373032200Z" level=error msg="encountered an error cleaning up failed sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.373117 env[1203]: time="2025-05-15T00:53:47.373082605Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-gw7kn,Uid:89e2d280-2615-4ec8-8862-59855f998485,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.373295 kubelet[1936]: E0515 00:53:47.373269 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.373348 kubelet[1936]: E0515 00:53:47.373302 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" May 15 00:53:47.373348 kubelet[1936]: E0515 00:53:47.373316 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" May 15 00:53:47.373399 kubelet[1936]: E0515 00:53:47.373355 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-77c7f9db84-gw7kn_calico-apiserver(89e2d280-2615-4ec8-8862-59855f998485)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-77c7f9db84-gw7kn_calico-apiserver(89e2d280-2615-4ec8-8862-59855f998485)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" podUID="89e2d280-2615-4ec8-8862-59855f998485" May 15 00:53:47.772057 systemd[1]: Created slice kubepods-besteffort-podd89698cf_ee3e_4bee_bff3_be4ff5bd14cc.slice. May 15 00:53:47.775398 env[1203]: time="2025-05-15T00:53:47.775358455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vztvt,Uid:d89698cf-ee3e-4bee-bff3-be4ff5bd14cc,Namespace:calico-system,Attempt:0,}" May 15 00:53:47.826685 kubelet[1936]: I0515 00:53:47.826647 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:53:47.827339 env[1203]: time="2025-05-15T00:53:47.827300848Z" level=info msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\"" May 15 00:53:47.830432 kubelet[1936]: E0515 00:53:47.830127 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:47.833584 env[1203]: time="2025-05-15T00:53:47.831695461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 00:53:47.833660 kubelet[1936]: I0515 00:53:47.832222 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:53:47.833884 env[1203]: time="2025-05-15T00:53:47.833839057Z" level=info msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\"" May 15 00:53:47.836785 kubelet[1936]: I0515 00:53:47.836221 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:53:47.836903 env[1203]: time="2025-05-15T00:53:47.836692381Z" level=info msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\"" May 15 00:53:47.838389 kubelet[1936]: I0515 00:53:47.837617 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:53:47.838477 env[1203]: time="2025-05-15T00:53:47.838312879Z" level=info msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\"" May 15 00:53:47.839316 kubelet[1936]: I0515 00:53:47.839282 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:53:47.839796 env[1203]: time="2025-05-15T00:53:47.839748278Z" level=info msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\"" May 15 00:53:47.840431 env[1203]: time="2025-05-15T00:53:47.840344944Z" level=error msg="Failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.841744 env[1203]: time="2025-05-15T00:53:47.841681696Z" level=error msg="encountered an error cleaning up failed sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.841825 env[1203]: time="2025-05-15T00:53:47.841734536Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vztvt,Uid:d89698cf-ee3e-4bee-bff3-be4ff5bd14cc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.842069 kubelet[1936]: E0515 00:53:47.842026 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.842153 kubelet[1936]: E0515 00:53:47.842113 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vztvt" May 15 00:53:47.842201 kubelet[1936]: E0515 00:53:47.842154 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vztvt" May 15 00:53:47.842322 kubelet[1936]: E0515 00:53:47.842268 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vztvt_calico-system(d89698cf-ee3e-4bee-bff3-be4ff5bd14cc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vztvt_calico-system(d89698cf-ee3e-4bee-bff3-be4ff5bd14cc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:47.881439 env[1203]: time="2025-05-15T00:53:47.881376176Z" level=error msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\" failed" error="failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.881606 kubelet[1936]: E0515 00:53:47.881571 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:53:47.881670 kubelet[1936]: E0515 00:53:47.881624 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78"} May 15 00:53:47.881698 kubelet[1936]: E0515 00:53:47.881674 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:47.881764 kubelet[1936]: E0515 00:53:47.881695 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" podUID="4cd3b8f2-79a6-432c-85dc-154ddf0fc558" May 15 00:53:47.899762 env[1203]: time="2025-05-15T00:53:47.899696598Z" level=error msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\" failed" error="failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.900150 env[1203]: time="2025-05-15T00:53:47.900051638Z" level=error msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\" failed" error="failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.900423 kubelet[1936]: E0515 00:53:47.900381 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:53:47.900423 kubelet[1936]: E0515 00:53:47.900401 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:53:47.900518 kubelet[1936]: E0515 00:53:47.900436 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd"} May 15 00:53:47.900518 kubelet[1936]: E0515 00:53:47.900446 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415"} May 15 00:53:47.900518 kubelet[1936]: E0515 00:53:47.900474 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:47.900518 kubelet[1936]: E0515 00:53:47.900479 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:47.900518 kubelet[1936]: E0515 00:53:47.900499 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tw99x" podUID="ca5d6b78-8a64-4987-912e-8674e449ef30" May 15 00:53:47.900710 kubelet[1936]: E0515 00:53:47.900508 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" podUID="b6b6552b-76ab-48e5-ad1c-6f738c64971c" May 15 00:53:47.907040 env[1203]: time="2025-05-15T00:53:47.906974864Z" level=error msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\" failed" error="failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.907266 kubelet[1936]: E0515 00:53:47.907224 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:53:47.907345 kubelet[1936]: E0515 00:53:47.907268 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80"} May 15 00:53:47.907345 kubelet[1936]: E0515 00:53:47.907307 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:47.907345 kubelet[1936]: E0515 00:53:47.907327 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-67h7f" podUID="514e78d1-5d35-4539-8295-ce066920cfd6" May 15 00:53:47.910321 env[1203]: time="2025-05-15T00:53:47.910251487Z" level=error msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\" failed" error="failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:47.910548 kubelet[1936]: E0515 00:53:47.910496 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:53:47.910606 kubelet[1936]: E0515 00:53:47.910545 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3"} May 15 00:53:47.910606 kubelet[1936]: E0515 00:53:47.910581 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:47.910684 kubelet[1936]: E0515 00:53:47.910603 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" podUID="89e2d280-2615-4ec8-8862-59855f998485" May 15 00:53:48.841209 kubelet[1936]: I0515 00:53:48.841175 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:53:48.841781 env[1203]: time="2025-05-15T00:53:48.841738662Z" level=info msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\"" May 15 00:53:48.867236 env[1203]: time="2025-05-15T00:53:48.867168322Z" level=error msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\" failed" error="failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:48.867435 kubelet[1936]: E0515 00:53:48.867377 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:53:48.867435 kubelet[1936]: E0515 00:53:48.867422 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8"} May 15 00:53:48.867520 kubelet[1936]: E0515 00:53:48.867459 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:48.867520 kubelet[1936]: E0515 00:53:48.867482 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:53:50.978061 systemd[1]: Started sshd@8-10.0.0.92:22-10.0.0.1:59436.service. May 15 00:53:50.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.92:22-10.0.0.1:59436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:50.979524 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 00:53:50.979637 kernel: audit: type=1130 audit(1747270430.977:1020): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.92:22-10.0.0.1:59436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:51.007000 audit[3014]: USER_ACCT pid=3014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.008195 sshd[3014]: Accepted publickey for core from 10.0.0.1 port 59436 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:53:51.010312 sshd[3014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:53:51.009000 audit[3014]: CRED_ACQ pid=3014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.014625 systemd-logind[1193]: New session 9 of user core. May 15 00:53:51.015878 systemd[1]: Started session-9.scope. May 15 00:53:51.016848 kernel: audit: type=1101 audit(1747270431.007:1021): pid=3014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.016892 kernel: audit: type=1103 audit(1747270431.009:1022): pid=3014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.016908 kernel: audit: type=1006 audit(1747270431.009:1023): pid=3014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 00:53:51.009000 audit[3014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff378992b0 a2=3 a3=0 items=0 ppid=1 pid=3014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:51.023458 kernel: audit: type=1300 audit(1747270431.009:1023): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff378992b0 a2=3 a3=0 items=0 ppid=1 pid=3014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:51.023505 kernel: audit: type=1327 audit(1747270431.009:1023): proctitle=737368643A20636F7265205B707269765D May 15 00:53:51.009000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:53:51.018000 audit[3014]: USER_START pid=3014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.029295 kernel: audit: type=1105 audit(1747270431.018:1024): pid=3014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.029335 kernel: audit: type=1103 audit(1747270431.020:1025): pid=3016 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.020000 audit[3016]: CRED_ACQ pid=3016 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.128378 sshd[3014]: pam_unix(sshd:session): session closed for user core May 15 00:53:51.128000 audit[3014]: USER_END pid=3014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.130750 systemd[1]: sshd@8-10.0.0.92:22-10.0.0.1:59436.service: Deactivated successfully. May 15 00:53:51.131404 systemd[1]: session-9.scope: Deactivated successfully. May 15 00:53:51.132292 systemd-logind[1193]: Session 9 logged out. Waiting for processes to exit. May 15 00:53:51.133040 systemd-logind[1193]: Removed session 9. May 15 00:53:51.128000 audit[3014]: CRED_DISP pid=3014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.137458 kernel: audit: type=1106 audit(1747270431.128:1026): pid=3014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.137516 kernel: audit: type=1104 audit(1747270431.128:1027): pid=3014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:51.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.92:22-10.0.0.1:59436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:56.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.92:22-10.0.0.1:59448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:56.133406 systemd[1]: Started sshd@9-10.0.0.92:22-10.0.0.1:59448.service. May 15 00:53:56.134610 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:53:56.134654 kernel: audit: type=1130 audit(1747270436.132:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.92:22-10.0.0.1:59448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:56.166000 audit[3032]: USER_ACCT pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.167825 sshd[3032]: Accepted publickey for core from 10.0.0.1 port 59448 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:53:56.170000 audit[3032]: CRED_ACQ pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.172224 sshd[3032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:53:56.175610 kernel: audit: type=1101 audit(1747270436.166:1030): pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.175668 kernel: audit: type=1103 audit(1747270436.170:1031): pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.175688 kernel: audit: type=1006 audit(1747270436.170:1032): pid=3032 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 00:53:56.176607 systemd[1]: Started session-10.scope. May 15 00:53:56.177028 systemd-logind[1193]: New session 10 of user core. May 15 00:53:56.170000 audit[3032]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd96977600 a2=3 a3=0 items=0 ppid=1 pid=3032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:56.191115 kernel: audit: type=1300 audit(1747270436.170:1032): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd96977600 a2=3 a3=0 items=0 ppid=1 pid=3032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:56.191237 kernel: audit: type=1327 audit(1747270436.170:1032): proctitle=737368643A20636F7265205B707269765D May 15 00:53:56.191257 kernel: audit: type=1105 audit(1747270436.180:1033): pid=3032 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.191280 kernel: audit: type=1103 audit(1747270436.182:1034): pid=3034 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:53:56.180000 audit[3032]: USER_START pid=3032 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.182000 audit[3034]: CRED_ACQ pid=3034 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.296221 sshd[3032]: pam_unix(sshd:session): session closed for user core May 15 00:53:56.306150 kernel: audit: type=1106 audit(1747270436.296:1035): pid=3032 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.306255 kernel: audit: type=1104 audit(1747270436.296:1036): pid=3032 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.296000 audit[3032]: USER_END pid=3032 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.296000 audit[3032]: CRED_DISP pid=3032 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:53:56.305216 systemd[1]: sshd@9-10.0.0.92:22-10.0.0.1:59448.service: Deactivated successfully. May 15 00:53:56.305852 systemd[1]: session-10.scope: Deactivated successfully. May 15 00:53:56.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.92:22-10.0.0.1:59448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:53:56.306522 systemd-logind[1193]: Session 10 logged out. Waiting for processes to exit. May 15 00:53:56.307276 systemd-logind[1193]: Removed session 10. May 15 00:53:56.366482 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1302250532.mount: Deactivated successfully. May 15 00:53:57.052977 env[1203]: time="2025-05-15T00:53:57.052911875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:57.055160 env[1203]: time="2025-05-15T00:53:57.055110061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:57.056654 env[1203]: time="2025-05-15T00:53:57.056621606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:57.058051 env[1203]: time="2025-05-15T00:53:57.058016912Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:53:57.058452 env[1203]: time="2025-05-15T00:53:57.058413417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 00:53:57.069319 env[1203]: time="2025-05-15T00:53:57.069272872Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:53:57.086266 env[1203]: time="2025-05-15T00:53:57.086213279Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f\"" May 15 00:53:57.086754 env[1203]: time="2025-05-15T00:53:57.086721725Z" level=info msg="StartContainer for \"b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f\"" May 15 00:53:57.100945 systemd[1]: Started cri-containerd-b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f.scope. May 15 00:53:57.120000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7faed467fcf8 items=0 ppid=2378 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313139363332653066363035663132333639646134333733663339 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.120000 audit: BPF prog-id=139 op=LOAD May 15 00:53:57.120000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009cc18 items=0 ppid=2378 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313139363332653066363035663132333639646134333733663339 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit: BPF prog-id=140 op=LOAD May 15 00:53:57.121000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009cc68 items=0 ppid=2378 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313139363332653066363035663132333639646134333733663339 May 15 00:53:57.121000 audit: BPF prog-id=140 op=UNLOAD May 15 00:53:57.121000 audit: BPF prog-id=139 op=UNLOAD May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.121000 audit: BPF prog-id=141 op=LOAD May 15 00:53:57.121000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009ccf8 items=0 ppid=2378 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313139363332653066363035663132333639646134333733663339 May 15 00:53:57.221807 env[1203]: time="2025-05-15T00:53:57.221752774Z" level=info msg="StartContainer for \"b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f\" returns successfully" May 15 00:53:57.259731 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 00:53:57.259840 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 00:53:57.309501 systemd[1]: cri-containerd-b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f.scope: Deactivated successfully. May 15 00:53:57.312000 audit: BPF prog-id=141 op=UNLOAD May 15 00:53:57.491084 env[1203]: time="2025-05-15T00:53:57.490999968Z" level=info msg="shim disconnected" id=b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f May 15 00:53:57.491084 env[1203]: time="2025-05-15T00:53:57.491068697Z" level=warning msg="cleaning up after shim disconnected" id=b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f namespace=k8s.io May 15 00:53:57.491084 env[1203]: time="2025-05-15T00:53:57.491084447Z" level=info msg="cleaning up dead shim" May 15 00:53:57.498895 env[1203]: time="2025-05-15T00:53:57.498852244Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:53:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3105 runtime=io.containerd.runc.v2\n" May 15 00:53:57.857193 kubelet[1936]: I0515 00:53:57.857152 1936 scope.go:117] "RemoveContainer" containerID="b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f" May 15 00:53:57.857542 kubelet[1936]: E0515 00:53:57.857222 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:57.858791 env[1203]: time="2025-05-15T00:53:57.858758291Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 15 00:53:57.879174 env[1203]: time="2025-05-15T00:53:57.879103925Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4\"" May 15 00:53:57.879690 env[1203]: time="2025-05-15T00:53:57.879650374Z" level=info msg="StartContainer for \"3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4\"" May 15 00:53:57.897720 systemd[1]: Started cri-containerd-3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4.scope. May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9135da6808 items=0 ppid=2378 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383266643132393030333763303630613830363535613236666538 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit: BPF prog-id=142 op=LOAD May 15 00:53:57.910000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003604c8 items=0 ppid=2378 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383266643132393030333763303630613830363535613236666538 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit: BPF prog-id=143 op=LOAD May 15 00:53:57.910000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000360518 items=0 ppid=2378 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383266643132393030333763303630613830363535613236666538 May 15 00:53:57.910000 audit: BPF prog-id=143 op=UNLOAD May 15 00:53:57.910000 audit: BPF prog-id=142 op=UNLOAD May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:53:57.910000 audit: BPF prog-id=144 op=LOAD May 15 00:53:57.910000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003605a8 items=0 ppid=2378 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:53:57.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383266643132393030333763303630613830363535613236666538 May 15 00:53:57.922364 env[1203]: time="2025-05-15T00:53:57.922307602Z" level=info msg="StartContainer for \"3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4\" returns successfully" May 15 00:53:57.968145 systemd[1]: cri-containerd-3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4.scope: Deactivated successfully. May 15 00:53:57.972000 audit: BPF prog-id=144 op=UNLOAD May 15 00:53:57.992430 env[1203]: time="2025-05-15T00:53:57.992368135Z" level=info msg="shim disconnected" id=3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4 May 15 00:53:57.992430 env[1203]: time="2025-05-15T00:53:57.992431004Z" level=warning msg="cleaning up after shim disconnected" id=3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4 namespace=k8s.io May 15 00:53:57.992430 env[1203]: time="2025-05-15T00:53:57.992445501Z" level=info msg="cleaning up dead shim" May 15 00:53:57.998992 env[1203]: time="2025-05-15T00:53:57.998944240Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:53:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3169 runtime=io.containerd.runc.v2\n" May 15 00:53:58.366806 systemd[1]: run-containerd-runc-k8s.io-3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4-runc.yQlBJl.mount: Deactivated successfully. May 15 00:53:58.366896 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4-rootfs.mount: Deactivated successfully. May 15 00:53:58.764322 env[1203]: time="2025-05-15T00:53:58.764279890Z" level=info msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\"" May 15 00:53:58.764322 env[1203]: time="2025-05-15T00:53:58.764303574Z" level=info msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\"" May 15 00:53:58.784686 env[1203]: time="2025-05-15T00:53:58.784625176Z" level=error msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\" failed" error="failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:58.784867 kubelet[1936]: E0515 00:53:58.784823 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:53:58.784973 kubelet[1936]: E0515 00:53:58.784878 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80"} May 15 00:53:58.784973 kubelet[1936]: E0515 00:53:58.784910 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:58.784973 kubelet[1936]: E0515 00:53:58.784944 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-67h7f" podUID="514e78d1-5d35-4539-8295-ce066920cfd6" May 15 00:53:58.787406 env[1203]: time="2025-05-15T00:53:58.787356475Z" level=error msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\" failed" error="failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:58.787530 kubelet[1936]: E0515 00:53:58.787496 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:53:58.787606 kubelet[1936]: E0515 00:53:58.787540 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd"} May 15 00:53:58.787606 kubelet[1936]: E0515 00:53:58.787577 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:58.787702 kubelet[1936]: E0515 00:53:58.787605 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tw99x" podUID="ca5d6b78-8a64-4987-912e-8674e449ef30" May 15 00:53:58.859964 kubelet[1936]: I0515 00:53:58.859934 1936 scope.go:117] "RemoveContainer" containerID="b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f" May 15 00:53:58.860347 kubelet[1936]: I0515 00:53:58.860264 1936 scope.go:117] "RemoveContainer" containerID="3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4" May 15 00:53:58.860387 kubelet[1936]: E0515 00:53:58.860345 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:58.860462 kubelet[1936]: E0515 00:53:58.860434 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-nzxp2_calico-system(1e06d30b-a82e-403a-a935-3079c2fba03c)\"" pod="calico-system/calico-node-nzxp2" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" May 15 00:53:58.860813 env[1203]: time="2025-05-15T00:53:58.860765862Z" level=info msg="RemoveContainer for \"b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f\"" May 15 00:53:58.864314 env[1203]: time="2025-05-15T00:53:58.864270085Z" level=info msg="RemoveContainer for \"b2119632e0f605f12369da4373f39316e422d8121b0542248f5a23969d696a0f\" returns successfully" May 15 00:53:59.764711 env[1203]: time="2025-05-15T00:53:59.764640844Z" level=info msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\"" May 15 00:53:59.765228 env[1203]: time="2025-05-15T00:53:59.764688964Z" level=info msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\"" May 15 00:53:59.790061 env[1203]: time="2025-05-15T00:53:59.789995084Z" level=error msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\" failed" error="failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:59.790298 kubelet[1936]: E0515 00:53:59.790252 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:53:59.790395 kubelet[1936]: E0515 00:53:59.790309 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415"} May 15 00:53:59.790395 kubelet[1936]: E0515 00:53:59.790342 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:59.790395 kubelet[1936]: E0515 00:53:59.790364 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" podUID="b6b6552b-76ab-48e5-ad1c-6f738c64971c" May 15 00:53:59.791384 env[1203]: time="2025-05-15T00:53:59.791328061Z" level=error msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\" failed" error="failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:53:59.791523 kubelet[1936]: E0515 00:53:59.791474 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:53:59.791576 kubelet[1936]: E0515 00:53:59.791530 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3"} May 15 00:53:59.791576 kubelet[1936]: E0515 00:53:59.791562 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:53:59.791652 kubelet[1936]: E0515 00:53:59.791584 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" podUID="89e2d280-2615-4ec8-8862-59855f998485" May 15 00:53:59.863866 kubelet[1936]: I0515 00:53:59.863837 1936 scope.go:117] "RemoveContainer" containerID="3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4" May 15 00:53:59.864204 kubelet[1936]: E0515 00:53:59.863901 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:53:59.864204 kubelet[1936]: E0515 00:53:59.863992 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-nzxp2_calico-system(1e06d30b-a82e-403a-a935-3079c2fba03c)\"" pod="calico-system/calico-node-nzxp2" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" May 15 00:54:00.765363 env[1203]: time="2025-05-15T00:54:00.765301725Z" level=info msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\"" May 15 00:54:00.765958 env[1203]: time="2025-05-15T00:54:00.765454262Z" level=info msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\"" May 15 00:54:00.791570 env[1203]: time="2025-05-15T00:54:00.791507469Z" level=error msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\" failed" error="failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:00.791995 kubelet[1936]: E0515 00:54:00.791943 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:00.792075 kubelet[1936]: E0515 00:54:00.791996 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78"} May 15 00:54:00.792075 kubelet[1936]: E0515 00:54:00.792025 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:00.792075 kubelet[1936]: E0515 00:54:00.792045 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" podUID="4cd3b8f2-79a6-432c-85dc-154ddf0fc558" May 15 00:54:00.796152 env[1203]: time="2025-05-15T00:54:00.796095307Z" level=error msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\" failed" error="failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:00.796298 kubelet[1936]: E0515 00:54:00.796265 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:00.796352 kubelet[1936]: E0515 00:54:00.796303 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8"} May 15 00:54:00.796352 kubelet[1936]: E0515 00:54:00.796329 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:00.796450 kubelet[1936]: E0515 00:54:00.796349 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:54:01.299594 systemd[1]: Started sshd@10-10.0.0.92:22-10.0.0.1:37878.service. May 15 00:54:01.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.92:22-10.0.0.1:37878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.300769 kernel: kauditd_printk_skb: 89 callbacks suppressed May 15 00:54:01.300942 kernel: audit: type=1130 audit(1747270441.298:1052): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.92:22-10.0.0.1:37878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.324793 kubelet[1936]: I0515 00:54:01.324731 1936 scope.go:117] "RemoveContainer" containerID="3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4" May 15 00:54:01.324793 kubelet[1936]: E0515 00:54:01.324797 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:01.325129 kubelet[1936]: E0515 00:54:01.324876 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-nzxp2_calico-system(1e06d30b-a82e-403a-a935-3079c2fba03c)\"" pod="calico-system/calico-node-nzxp2" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" May 15 00:54:01.327000 audit[3329]: USER_ACCT pid=3329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.328650 sshd[3329]: Accepted publickey for core from 10.0.0.1 port 37878 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:01.343129 sshd[3329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:01.329000 audit[3329]: CRED_ACQ pid=3329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.346639 systemd-logind[1193]: New session 11 of user core. May 15 00:54:01.346988 systemd[1]: Started session-11.scope. May 15 00:54:01.350444 kernel: audit: type=1101 audit(1747270441.327:1053): pid=3329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.350509 kernel: audit: type=1103 audit(1747270441.329:1054): pid=3329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.352935 kernel: audit: type=1006 audit(1747270441.329:1055): pid=3329 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 00:54:01.329000 audit[3329]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ddf5150 a2=3 a3=0 items=0 ppid=1 pid=3329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:01.388300 kernel: audit: type=1300 audit(1747270441.329:1055): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ddf5150 a2=3 a3=0 items=0 ppid=1 pid=3329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:01.329000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:01.389713 kernel: audit: type=1327 audit(1747270441.329:1055): proctitle=737368643A20636F7265205B707269765D May 15 00:54:01.389758 kernel: audit: type=1105 audit(1747270441.350:1056): pid=3329 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.350000 audit[3329]: USER_START pid=3329 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.393869 kernel: audit: type=1103 audit(1747270441.351:1057): pid=3331 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.351000 audit[3331]: CRED_ACQ pid=3331 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.452619 sshd[3329]: pam_unix(sshd:session): session closed for user core May 15 00:54:01.452000 audit[3329]: USER_END pid=3329 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.455353 systemd[1]: sshd@10-10.0.0.92:22-10.0.0.1:37878.service: Deactivated successfully. May 15 00:54:01.455841 systemd[1]: session-11.scope: Deactivated successfully. May 15 00:54:01.457349 systemd[1]: Started sshd@11-10.0.0.92:22-10.0.0.1:37880.service. May 15 00:54:01.457742 systemd-logind[1193]: Session 11 logged out. Waiting for processes to exit. May 15 00:54:01.458583 systemd-logind[1193]: Removed session 11. May 15 00:54:01.452000 audit[3329]: CRED_DISP pid=3329 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.469046 kernel: audit: type=1106 audit(1747270441.452:1058): pid=3329 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.469096 kernel: audit: type=1104 audit(1747270441.452:1059): pid=3329 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.92:22-10.0.0.1:37878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.92:22-10.0.0.1:37880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.488000 audit[3343]: USER_ACCT pid=3343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.489488 sshd[3343]: Accepted publickey for core from 10.0.0.1 port 37880 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:01.489000 audit[3343]: CRED_ACQ pid=3343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.489000 audit[3343]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb47539c0 a2=3 a3=0 items=0 ppid=1 pid=3343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:01.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:01.490873 sshd[3343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:01.494650 systemd-logind[1193]: New session 12 of user core. May 15 00:54:01.495457 systemd[1]: Started session-12.scope. May 15 00:54:01.498000 audit[3343]: USER_START pid=3343 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.499000 audit[3345]: CRED_ACQ pid=3345 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.666790 sshd[3343]: pam_unix(sshd:session): session closed for user core May 15 00:54:01.666000 audit[3343]: USER_END pid=3343 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.666000 audit[3343]: CRED_DISP pid=3343 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.669520 systemd[1]: Started sshd@12-10.0.0.92:22-10.0.0.1:37890.service. May 15 00:54:01.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.92:22-10.0.0.1:37890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.673264 systemd[1]: sshd@11-10.0.0.92:22-10.0.0.1:37880.service: Deactivated successfully. May 15 00:54:01.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.92:22-10.0.0.1:37880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.673799 systemd[1]: session-12.scope: Deactivated successfully. May 15 00:54:01.674987 systemd-logind[1193]: Session 12 logged out. Waiting for processes to exit. May 15 00:54:01.675796 systemd-logind[1193]: Removed session 12. May 15 00:54:01.699000 audit[3353]: USER_ACCT pid=3353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.700969 sshd[3353]: Accepted publickey for core from 10.0.0.1 port 37890 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:01.701000 audit[3353]: CRED_ACQ pid=3353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.701000 audit[3353]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf2473b20 a2=3 a3=0 items=0 ppid=1 pid=3353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:01.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:01.702259 sshd[3353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:01.705808 systemd-logind[1193]: New session 13 of user core. May 15 00:54:01.706891 systemd[1]: Started session-13.scope. May 15 00:54:01.710000 audit[3353]: USER_START pid=3353 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.712000 audit[3356]: CRED_ACQ pid=3356 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.812684 sshd[3353]: pam_unix(sshd:session): session closed for user core May 15 00:54:01.812000 audit[3353]: USER_END pid=3353 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.812000 audit[3353]: CRED_DISP pid=3353 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:01.815314 systemd[1]: sshd@12-10.0.0.92:22-10.0.0.1:37890.service: Deactivated successfully. May 15 00:54:01.815997 systemd[1]: session-13.scope: Deactivated successfully. May 15 00:54:01.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.92:22-10.0.0.1:37890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:01.816641 systemd-logind[1193]: Session 13 logged out. Waiting for processes to exit. May 15 00:54:01.817416 systemd-logind[1193]: Removed session 13. May 15 00:54:06.816889 systemd[1]: Started sshd@13-10.0.0.92:22-10.0.0.1:37904.service. May 15 00:54:06.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.92:22-10.0.0.1:37904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:06.821168 kernel: kauditd_printk_skb: 23 callbacks suppressed May 15 00:54:06.821448 kernel: audit: type=1130 audit(1747270446.816:1079): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.92:22-10.0.0.1:37904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:06.846000 audit[3367]: USER_ACCT pid=3367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.847517 sshd[3367]: Accepted publickey for core from 10.0.0.1 port 37904 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:06.849421 sshd[3367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:06.848000 audit[3367]: CRED_ACQ pid=3367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.852513 systemd-logind[1193]: New session 14 of user core. May 15 00:54:06.853244 systemd[1]: Started session-14.scope. May 15 00:54:06.854930 kernel: audit: type=1101 audit(1747270446.846:1080): pid=3367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.854977 kernel: audit: type=1103 audit(1747270446.848:1081): pid=3367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.854998 kernel: audit: type=1006 audit(1747270446.848:1082): pid=3367 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 00:54:06.848000 audit[3367]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc24e85010 a2=3 a3=0 items=0 ppid=1 pid=3367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:06.861123 kernel: audit: type=1300 audit(1747270446.848:1082): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc24e85010 a2=3 a3=0 items=0 ppid=1 pid=3367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:06.861166 kernel: audit: type=1327 audit(1747270446.848:1082): proctitle=737368643A20636F7265205B707269765D May 15 00:54:06.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:06.856000 audit[3367]: USER_START pid=3367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.866657 kernel: audit: type=1105 audit(1747270446.856:1083): pid=3367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.866700 kernel: audit: type=1103 audit(1747270446.857:1084): pid=3369 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.857000 audit[3369]: CRED_ACQ pid=3369 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.955482 sshd[3367]: pam_unix(sshd:session): session closed for user core May 15 00:54:06.955000 audit[3367]: USER_END pid=3367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.957754 systemd[1]: sshd@13-10.0.0.92:22-10.0.0.1:37904.service: Deactivated successfully. May 15 00:54:06.958435 systemd[1]: session-14.scope: Deactivated successfully. May 15 00:54:06.959117 systemd-logind[1193]: Session 14 logged out. Waiting for processes to exit. May 15 00:54:06.959707 systemd-logind[1193]: Removed session 14. May 15 00:54:06.955000 audit[3367]: CRED_DISP pid=3367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.964136 kernel: audit: type=1106 audit(1747270446.955:1085): pid=3367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.964191 kernel: audit: type=1104 audit(1747270446.955:1086): pid=3367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:06.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.92:22-10.0.0.1:37904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:11.764818 env[1203]: time="2025-05-15T00:54:11.764772203Z" level=info msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\"" May 15 00:54:11.787938 env[1203]: time="2025-05-15T00:54:11.787856069Z" level=error msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\" failed" error="failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:11.788147 kubelet[1936]: E0515 00:54:11.788106 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:54:11.788434 kubelet[1936]: E0515 00:54:11.788164 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80"} May 15 00:54:11.788434 kubelet[1936]: E0515 00:54:11.788200 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:11.788434 kubelet[1936]: E0515 00:54:11.788224 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-67h7f" podUID="514e78d1-5d35-4539-8295-ce066920cfd6" May 15 00:54:11.959981 systemd[1]: Started sshd@14-10.0.0.92:22-10.0.0.1:58088.service. May 15 00:54:11.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.92:22-10.0.0.1:58088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:11.962944 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:54:11.963015 kernel: audit: type=1130 audit(1747270451.959:1088): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.92:22-10.0.0.1:58088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:11.992000 audit[3405]: USER_ACCT pid=3405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:11.993388 sshd[3405]: Accepted publickey for core from 10.0.0.1 port 58088 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:11.995429 sshd[3405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:11.994000 audit[3405]: CRED_ACQ pid=3405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:11.999140 systemd-logind[1193]: New session 15 of user core. May 15 00:54:11.999858 systemd[1]: Started session-15.scope. May 15 00:54:12.001751 kernel: audit: type=1101 audit(1747270451.992:1089): pid=3405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.001806 kernel: audit: type=1103 audit(1747270451.994:1090): pid=3405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.001830 kernel: audit: type=1006 audit(1747270451.994:1091): pid=3405 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 00:54:11.994000 audit[3405]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05bc3b30 a2=3 a3=0 items=0 ppid=1 pid=3405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:12.008819 kernel: audit: type=1300 audit(1747270451.994:1091): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05bc3b30 a2=3 a3=0 items=0 ppid=1 pid=3405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:12.008858 kernel: audit: type=1327 audit(1747270451.994:1091): proctitle=737368643A20636F7265205B707269765D May 15 00:54:11.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:12.002000 audit[3405]: USER_START pid=3405 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.015023 kernel: audit: type=1105 audit(1747270452.002:1092): pid=3405 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.015090 kernel: audit: type=1103 audit(1747270452.004:1093): pid=3407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.004000 audit[3407]: CRED_ACQ pid=3407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.103432 sshd[3405]: pam_unix(sshd:session): session closed for user core May 15 00:54:12.103000 audit[3405]: USER_END pid=3405 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.106081 systemd[1]: sshd@14-10.0.0.92:22-10.0.0.1:58088.service: Deactivated successfully. May 15 00:54:12.106752 systemd[1]: session-15.scope: Deactivated successfully. May 15 00:54:12.107443 systemd-logind[1193]: Session 15 logged out. Waiting for processes to exit. May 15 00:54:12.108186 systemd-logind[1193]: Removed session 15. May 15 00:54:12.103000 audit[3405]: CRED_DISP pid=3405 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.112349 kernel: audit: type=1106 audit(1747270452.103:1094): pid=3405 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.112415 kernel: audit: type=1104 audit(1747270452.103:1095): pid=3405 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:12.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.92:22-10.0.0.1:58088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:12.764876 env[1203]: time="2025-05-15T00:54:12.764836099Z" level=info msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\"" May 15 00:54:12.791631 env[1203]: time="2025-05-15T00:54:12.791551560Z" level=error msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\" failed" error="failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:12.791882 kubelet[1936]: E0515 00:54:12.791836 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:12.792196 kubelet[1936]: E0515 00:54:12.791891 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78"} May 15 00:54:12.792196 kubelet[1936]: E0515 00:54:12.791935 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:12.792196 kubelet[1936]: E0515 00:54:12.791955 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" podUID="4cd3b8f2-79a6-432c-85dc-154ddf0fc558" May 15 00:54:13.764577 env[1203]: time="2025-05-15T00:54:13.764529804Z" level=info msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\"" May 15 00:54:13.764888 env[1203]: time="2025-05-15T00:54:13.764529764Z" level=info msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\"" May 15 00:54:13.790934 env[1203]: time="2025-05-15T00:54:13.790858336Z" level=error msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\" failed" error="failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:13.791260 kubelet[1936]: E0515 00:54:13.791096 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:54:13.791260 kubelet[1936]: E0515 00:54:13.791162 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd"} May 15 00:54:13.791260 kubelet[1936]: E0515 00:54:13.791202 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:13.791260 kubelet[1936]: E0515 00:54:13.791232 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tw99x" podUID="ca5d6b78-8a64-4987-912e-8674e449ef30" May 15 00:54:13.793842 env[1203]: time="2025-05-15T00:54:13.793805941Z" level=error msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\" failed" error="failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:13.793981 kubelet[1936]: E0515 00:54:13.793949 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:54:13.793981 kubelet[1936]: E0515 00:54:13.793977 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3"} May 15 00:54:13.794182 kubelet[1936]: E0515 00:54:13.794002 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:13.794182 kubelet[1936]: E0515 00:54:13.794022 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" podUID="89e2d280-2615-4ec8-8862-59855f998485" May 15 00:54:14.764504 env[1203]: time="2025-05-15T00:54:14.764445593Z" level=info msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\"" May 15 00:54:14.791260 env[1203]: time="2025-05-15T00:54:14.791197025Z" level=error msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\" failed" error="failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:14.791620 kubelet[1936]: E0515 00:54:14.791435 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:54:14.791620 kubelet[1936]: E0515 00:54:14.791493 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415"} May 15 00:54:14.791620 kubelet[1936]: E0515 00:54:14.791531 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:14.791620 kubelet[1936]: E0515 00:54:14.791563 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" podUID="b6b6552b-76ab-48e5-ad1c-6f738c64971c" May 15 00:54:15.765125 kubelet[1936]: I0515 00:54:15.765068 1936 scope.go:117] "RemoveContainer" containerID="3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4" May 15 00:54:15.765541 kubelet[1936]: E0515 00:54:15.765143 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:15.765589 env[1203]: time="2025-05-15T00:54:15.765266403Z" level=info msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\"" May 15 00:54:15.767761 env[1203]: time="2025-05-15T00:54:15.767722535Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 15 00:54:15.781045 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4118025576.mount: Deactivated successfully. May 15 00:54:15.784142 env[1203]: time="2025-05-15T00:54:15.784087340Z" level=info msg="CreateContainer within sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\"" May 15 00:54:15.784769 env[1203]: time="2025-05-15T00:54:15.784738193Z" level=info msg="StartContainer for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\"" May 15 00:54:15.797406 env[1203]: time="2025-05-15T00:54:15.797353539Z" level=error msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\" failed" error="failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:15.797671 kubelet[1936]: E0515 00:54:15.797624 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:15.797754 kubelet[1936]: E0515 00:54:15.797682 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8"} May 15 00:54:15.797754 kubelet[1936]: E0515 00:54:15.797712 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:15.797754 kubelet[1936]: E0515 00:54:15.797740 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:54:15.808876 systemd[1]: Started cri-containerd-8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c.scope. May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd2e0c83b48 items=0 ppid=2378 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:15.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633938346334353332316566653138383139653361346535373066 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit: BPF prog-id=145 op=LOAD May 15 00:54:15.822000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a8cd8 items=0 ppid=2378 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:15.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633938346334353332316566653138383139653361346535373066 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit: BPF prog-id=146 op=LOAD May 15 00:54:15.822000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a8d28 items=0 ppid=2378 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:15.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633938346334353332316566653138383139653361346535373066 May 15 00:54:15.822000 audit: BPF prog-id=146 op=UNLOAD May 15 00:54:15.822000 audit: BPF prog-id=145 op=UNLOAD May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:15.822000 audit: BPF prog-id=147 op=LOAD May 15 00:54:15.822000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a8db8 items=0 ppid=2378 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:15.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633938346334353332316566653138383139653361346535373066 May 15 00:54:15.837105 env[1203]: time="2025-05-15T00:54:15.837040475Z" level=info msg="StartContainer for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\" returns successfully" May 15 00:54:15.883869 systemd[1]: cri-containerd-8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c.scope: Deactivated successfully. May 15 00:54:15.887000 audit: BPF prog-id=147 op=UNLOAD May 15 00:54:15.896303 kubelet[1936]: E0515 00:54:15.896261 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:15.911402 kubelet[1936]: I0515 00:54:15.911341 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-nzxp2" podStartSLOduration=20.253169713 podStartE2EDuration="44.911326655s" podCreationTimestamp="2025-05-15 00:53:31 +0000 UTC" firstStartedPulling="2025-05-15 00:53:32.401054868 +0000 UTC m=+11.708876646" lastFinishedPulling="2025-05-15 00:53:57.05921181 +0000 UTC m=+36.367033588" observedRunningTime="2025-05-15 00:54:15.911074621 +0000 UTC m=+55.218896409" watchObservedRunningTime="2025-05-15 00:54:15.911326655 +0000 UTC m=+55.219148433" May 15 00:54:15.915114 env[1203]: time="2025-05-15T00:54:15.915044876Z" level=error msg="ExecSync for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"3ff9c9d5d6f3f21c5629c4bc7dce89bf3ad3ccf1e9fcb9adf61ac78be392a34a\": task 8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c not found: not found" May 15 00:54:15.915269 env[1203]: time="2025-05-15T00:54:15.915233029Z" level=info msg="shim disconnected" id=8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c May 15 00:54:15.915269 env[1203]: time="2025-05-15T00:54:15.915265840Z" level=warning msg="cleaning up after shim disconnected" id=8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c namespace=k8s.io May 15 00:54:15.915362 env[1203]: time="2025-05-15T00:54:15.915274517Z" level=info msg="cleaning up dead shim" May 15 00:54:15.915406 kubelet[1936]: E0515 00:54:15.915250 1936 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"3ff9c9d5d6f3f21c5629c4bc7dce89bf3ad3ccf1e9fcb9adf61ac78be392a34a\": task 8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c not found: not found" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 00:54:15.916193 env[1203]: time="2025-05-15T00:54:15.916141094Z" level=error msg="ExecSync for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c not found: not found" May 15 00:54:15.916308 kubelet[1936]: E0515 00:54:15.916276 1936 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c not found: not found" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 00:54:15.917185 env[1203]: time="2025-05-15T00:54:15.917133166Z" level=error msg="ExecSync for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c not found: not found" May 15 00:54:15.917248 kubelet[1936]: E0515 00:54:15.917225 1936 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c not found: not found" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 00:54:15.921645 env[1203]: time="2025-05-15T00:54:15.921619520Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:54:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3592 runtime=io.containerd.runc.v2\n" May 15 00:54:16.776804 systemd[1]: run-containerd-runc-k8s.io-8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c-runc.8NfNWu.mount: Deactivated successfully. May 15 00:54:16.776893 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c-rootfs.mount: Deactivated successfully. May 15 00:54:16.899437 kubelet[1936]: I0515 00:54:16.899408 1936 scope.go:117] "RemoveContainer" containerID="3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4" May 15 00:54:16.899776 kubelet[1936]: I0515 00:54:16.899750 1936 scope.go:117] "RemoveContainer" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" May 15 00:54:16.899833 kubelet[1936]: E0515 00:54:16.899814 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:16.899952 kubelet[1936]: E0515 00:54:16.899896 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-nzxp2_calico-system(1e06d30b-a82e-403a-a935-3079c2fba03c)\"" pod="calico-system/calico-node-nzxp2" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" May 15 00:54:16.900885 env[1203]: time="2025-05-15T00:54:16.900847553Z" level=info msg="RemoveContainer for \"3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4\"" May 15 00:54:16.904311 env[1203]: time="2025-05-15T00:54:16.904257765Z" level=info msg="RemoveContainer for \"3382fd1290037c060a80655a26fe8180385e3e65946b443f0b8d70112f3c01a4\" returns successfully" May 15 00:54:17.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.92:22-10.0.0.1:58104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:17.107923 systemd[1]: Started sshd@15-10.0.0.92:22-10.0.0.1:58104.service. May 15 00:54:17.109000 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 00:54:17.109051 kernel: audit: type=1130 audit(1747270457.107:1104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.92:22-10.0.0.1:58104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:17.135000 audit[3606]: USER_ACCT pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.136400 sshd[3606]: Accepted publickey for core from 10.0.0.1 port 58104 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:17.138426 sshd[3606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:17.137000 audit[3606]: CRED_ACQ pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.141885 systemd-logind[1193]: New session 16 of user core. May 15 00:54:17.142616 systemd[1]: Started session-16.scope. May 15 00:54:17.143726 kernel: audit: type=1101 audit(1747270457.135:1105): pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.143785 kernel: audit: type=1103 audit(1747270457.137:1106): pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.143806 kernel: audit: type=1006 audit(1747270457.137:1107): pid=3606 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 00:54:17.137000 audit[3606]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d072210 a2=3 a3=0 items=0 ppid=1 pid=3606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:17.149970 kernel: audit: type=1300 audit(1747270457.137:1107): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d072210 a2=3 a3=0 items=0 ppid=1 pid=3606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:17.150018 kernel: audit: type=1327 audit(1747270457.137:1107): proctitle=737368643A20636F7265205B707269765D May 15 00:54:17.137000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:17.151295 kernel: audit: type=1105 audit(1747270457.146:1108): pid=3606 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.146000 audit[3606]: USER_START pid=3606 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.155603 kernel: audit: type=1103 audit(1747270457.147:1109): pid=3608 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.147000 audit[3608]: CRED_ACQ pid=3608 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.244211 sshd[3606]: pam_unix(sshd:session): session closed for user core May 15 00:54:17.244000 audit[3606]: USER_END pid=3606 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.246604 systemd[1]: sshd@15-10.0.0.92:22-10.0.0.1:58104.service: Deactivated successfully. May 15 00:54:17.247293 systemd[1]: session-16.scope: Deactivated successfully. May 15 00:54:17.247874 systemd-logind[1193]: Session 16 logged out. Waiting for processes to exit. May 15 00:54:17.248537 systemd-logind[1193]: Removed session 16. May 15 00:54:17.244000 audit[3606]: CRED_DISP pid=3606 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.252944 kernel: audit: type=1106 audit(1747270457.244:1110): pid=3606 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.253040 kernel: audit: type=1104 audit(1747270457.244:1111): pid=3606 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:17.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.92:22-10.0.0.1:58104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:17.629000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.629000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.629000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cbcdb0 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:54:17.629000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00251ede0 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:54:17.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:54:17.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:54:17.659000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.659000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.659000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00faf2000 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:54:17.659000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00fb880c0 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:54:17.659000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:54:17.659000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:54:17.660000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.660000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00fb880f0 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:54:17.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:54:17.662000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.662000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00fd86180 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:54:17.662000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:54:17.662000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f09c300 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:54:17.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:54:17.670000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:17.670000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01008c1e0 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:54:17.670000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:54:17.903384 kubelet[1936]: I0515 00:54:17.903279 1936 scope.go:117] "RemoveContainer" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" May 15 00:54:17.903384 kubelet[1936]: E0515 00:54:17.903355 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:17.903725 kubelet[1936]: E0515 00:54:17.903448 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-nzxp2_calico-system(1e06d30b-a82e-403a-a935-3079c2fba03c)\"" pod="calico-system/calico-node-nzxp2" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" May 15 00:54:22.249430 systemd[1]: Started sshd@16-10.0.0.92:22-10.0.0.1:48418.service. May 15 00:54:22.251007 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 00:54:22.251062 kernel: audit: type=1130 audit(1747270462.248:1121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.92:22-10.0.0.1:48418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:22.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.92:22-10.0.0.1:48418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:22.276000 audit[3622]: USER_ACCT pid=3622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.277738 sshd[3622]: Accepted publickey for core from 10.0.0.1 port 48418 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:22.280020 sshd[3622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:22.278000 audit[3622]: CRED_ACQ pid=3622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.283537 systemd-logind[1193]: New session 17 of user core. May 15 00:54:22.284309 systemd[1]: Started session-17.scope. May 15 00:54:22.285320 kernel: audit: type=1101 audit(1747270462.276:1122): pid=3622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.285365 kernel: audit: type=1103 audit(1747270462.278:1123): pid=3622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.285407 kernel: audit: type=1006 audit(1747270462.278:1124): pid=3622 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 00:54:22.278000 audit[3622]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a23e460 a2=3 a3=0 items=0 ppid=1 pid=3622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:22.291429 kernel: audit: type=1300 audit(1747270462.278:1124): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a23e460 a2=3 a3=0 items=0 ppid=1 pid=3622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:22.291481 kernel: audit: type=1327 audit(1747270462.278:1124): proctitle=737368643A20636F7265205B707269765D May 15 00:54:22.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:22.292734 kernel: audit: type=1105 audit(1747270462.288:1125): pid=3622 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.288000 audit[3622]: USER_START pid=3622 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.289000 audit[3624]: CRED_ACQ pid=3624 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.300244 kernel: audit: type=1103 audit(1747270462.289:1126): pid=3624 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.386388 sshd[3622]: pam_unix(sshd:session): session closed for user core May 15 00:54:22.386000 audit[3622]: USER_END pid=3622 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.388533 systemd[1]: sshd@16-10.0.0.92:22-10.0.0.1:48418.service: Deactivated successfully. May 15 00:54:22.389186 systemd[1]: session-17.scope: Deactivated successfully. May 15 00:54:22.389722 systemd-logind[1193]: Session 17 logged out. Waiting for processes to exit. May 15 00:54:22.390334 systemd-logind[1193]: Removed session 17. May 15 00:54:22.386000 audit[3622]: CRED_DISP pid=3622 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.394841 kernel: audit: type=1106 audit(1747270462.386:1127): pid=3622 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.394872 kernel: audit: type=1104 audit(1747270462.386:1128): pid=3622 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:22.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.92:22-10.0.0.1:48418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:22.764591 env[1203]: time="2025-05-15T00:54:22.764543714Z" level=info msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\"" May 15 00:54:22.787892 env[1203]: time="2025-05-15T00:54:22.787824480Z" level=error msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\" failed" error="failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:22.788102 kubelet[1936]: E0515 00:54:22.788057 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:54:22.788318 kubelet[1936]: E0515 00:54:22.788110 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80"} May 15 00:54:22.788318 kubelet[1936]: E0515 00:54:22.788146 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:22.788318 kubelet[1936]: E0515 00:54:22.788170 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"514e78d1-5d35-4539-8295-ce066920cfd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-67h7f" podUID="514e78d1-5d35-4539-8295-ce066920cfd6" May 15 00:54:23.060000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:23.060000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00293ce20 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:54:23.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:54:23.061000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:23.061000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e745e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:54:23.061000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:23.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:54:23.061000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00293ce40 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:54:23.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:54:23.069000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:54:23.069000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002422f20 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:54:23.069000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:54:23.765206 env[1203]: time="2025-05-15T00:54:23.765125566Z" level=info msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\"" May 15 00:54:23.787080 env[1203]: time="2025-05-15T00:54:23.787002586Z" level=error msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\" failed" error="failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:23.787284 kubelet[1936]: E0515 00:54:23.787237 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:23.787331 kubelet[1936]: E0515 00:54:23.787293 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78"} May 15 00:54:23.787331 kubelet[1936]: E0515 00:54:23.787325 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:23.787434 kubelet[1936]: E0515 00:54:23.787347 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4cd3b8f2-79a6-432c-85dc-154ddf0fc558\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" podUID="4cd3b8f2-79a6-432c-85dc-154ddf0fc558" May 15 00:54:26.764617 env[1203]: time="2025-05-15T00:54:26.764570769Z" level=info msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\"" May 15 00:54:26.765163 env[1203]: time="2025-05-15T00:54:26.764705923Z" level=info msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\"" May 15 00:54:26.793114 env[1203]: time="2025-05-15T00:54:26.793043773Z" level=error msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\" failed" error="failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:26.793363 kubelet[1936]: E0515 00:54:26.793300 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:26.793613 kubelet[1936]: E0515 00:54:26.793370 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8"} May 15 00:54:26.793613 kubelet[1936]: E0515 00:54:26.793415 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:26.793613 kubelet[1936]: E0515 00:54:26.793443 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vztvt" podUID="d89698cf-ee3e-4bee-bff3-be4ff5bd14cc" May 15 00:54:26.796561 env[1203]: time="2025-05-15T00:54:26.796519045Z" level=error msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\" failed" error="failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:26.796727 kubelet[1936]: E0515 00:54:26.796692 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:54:26.796811 kubelet[1936]: E0515 00:54:26.796735 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415"} May 15 00:54:26.796811 kubelet[1936]: E0515 00:54:26.796767 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:26.796811 kubelet[1936]: E0515 00:54:26.796790 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6b6552b-76ab-48e5-ad1c-6f738c64971c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" podUID="b6b6552b-76ab-48e5-ad1c-6f738c64971c" May 15 00:54:27.390327 systemd[1]: Started sshd@17-10.0.0.92:22-10.0.0.1:48422.service. May 15 00:54:27.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.92:22-10.0.0.1:48422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:27.391275 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 00:54:27.391333 kernel: audit: type=1130 audit(1747270467.389:1134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.92:22-10.0.0.1:48422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:27.417000 audit[3734]: USER_ACCT pid=3734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.418621 sshd[3734]: Accepted publickey for core from 10.0.0.1 port 48422 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:27.420376 sshd[3734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:27.419000 audit[3734]: CRED_ACQ pid=3734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.423255 systemd-logind[1193]: New session 18 of user core. May 15 00:54:27.423936 systemd[1]: Started session-18.scope. May 15 00:54:27.425841 kernel: audit: type=1101 audit(1747270467.417:1135): pid=3734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.425886 kernel: audit: type=1103 audit(1747270467.419:1136): pid=3734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.425908 kernel: audit: type=1006 audit(1747270467.419:1137): pid=3734 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 00:54:27.419000 audit[3734]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8fed30e0 a2=3 a3=0 items=0 ppid=1 pid=3734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:27.432015 kernel: audit: type=1300 audit(1747270467.419:1137): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8fed30e0 a2=3 a3=0 items=0 ppid=1 pid=3734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:27.432071 kernel: audit: type=1327 audit(1747270467.419:1137): proctitle=737368643A20636F7265205B707269765D May 15 00:54:27.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:27.427000 audit[3734]: USER_START pid=3734 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.438317 kernel: audit: type=1105 audit(1747270467.427:1138): pid=3734 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.438354 kernel: audit: type=1103 audit(1747270467.428:1139): pid=3736 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.428000 audit[3736]: CRED_ACQ pid=3736 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.519775 sshd[3734]: pam_unix(sshd:session): session closed for user core May 15 00:54:27.519000 audit[3734]: USER_END pid=3734 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.521883 systemd[1]: sshd@17-10.0.0.92:22-10.0.0.1:48422.service: Deactivated successfully. May 15 00:54:27.522579 systemd[1]: session-18.scope: Deactivated successfully. May 15 00:54:27.525510 systemd-logind[1193]: Session 18 logged out. Waiting for processes to exit. May 15 00:54:27.519000 audit[3734]: CRED_DISP pid=3734 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.526264 systemd-logind[1193]: Removed session 18. May 15 00:54:27.529227 kernel: audit: type=1106 audit(1747270467.519:1140): pid=3734 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.529272 kernel: audit: type=1104 audit(1747270467.519:1141): pid=3734 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:27.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.92:22-10.0.0.1:48422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:27.764346 env[1203]: time="2025-05-15T00:54:27.764289180Z" level=info msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\"" May 15 00:54:27.785374 env[1203]: time="2025-05-15T00:54:27.785311555Z" level=error msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\" failed" error="failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:27.785723 kubelet[1936]: E0515 00:54:27.785551 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:54:27.785723 kubelet[1936]: E0515 00:54:27.785604 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd"} May 15 00:54:27.785723 kubelet[1936]: E0515 00:54:27.785636 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:27.785723 kubelet[1936]: E0515 00:54:27.785656 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca5d6b78-8a64-4987-912e-8674e449ef30\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tw99x" podUID="ca5d6b78-8a64-4987-912e-8674e449ef30" May 15 00:54:28.765255 env[1203]: time="2025-05-15T00:54:28.765209101Z" level=info msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\"" May 15 00:54:28.785924 env[1203]: time="2025-05-15T00:54:28.785849682Z" level=error msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\" failed" error="failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:54:28.786259 kubelet[1936]: E0515 00:54:28.786106 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:54:28.786259 kubelet[1936]: E0515 00:54:28.786162 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3"} May 15 00:54:28.786259 kubelet[1936]: E0515 00:54:28.786200 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:54:28.786259 kubelet[1936]: E0515 00:54:28.786230 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89e2d280-2615-4ec8-8862-59855f998485\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" podUID="89e2d280-2615-4ec8-8862-59855f998485" May 15 00:54:30.764664 kubelet[1936]: I0515 00:54:30.764621 1936 scope.go:117] "RemoveContainer" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" May 15 00:54:30.765064 kubelet[1936]: E0515 00:54:30.764710 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:30.765064 kubelet[1936]: E0515 00:54:30.764877 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-nzxp2_calico-system(1e06d30b-a82e-403a-a935-3079c2fba03c)\"" pod="calico-system/calico-node-nzxp2" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" May 15 00:54:32.220328 env[1203]: time="2025-05-15T00:54:32.220270589Z" level=info msg="StopPodSandbox for \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\"" May 15 00:54:32.222902 env[1203]: time="2025-05-15T00:54:32.220341185Z" level=info msg="Container to stop \"023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:54:32.222902 env[1203]: time="2025-05-15T00:54:32.220357447Z" level=info msg="Container to stop \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:54:32.222902 env[1203]: time="2025-05-15T00:54:32.220367366Z" level=info msg="Container to stop \"d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:54:32.222772 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55-shm.mount: Deactivated successfully. May 15 00:54:32.227241 systemd[1]: cri-containerd-e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55.scope: Deactivated successfully. May 15 00:54:32.226000 audit: BPF prog-id=125 op=UNLOAD May 15 00:54:32.230000 audit: BPF prog-id=128 op=UNLOAD May 15 00:54:32.250738 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55-rootfs.mount: Deactivated successfully. May 15 00:54:32.259620 env[1203]: time="2025-05-15T00:54:32.259579705Z" level=info msg="shim disconnected" id=e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55 May 15 00:54:32.260230 env[1203]: time="2025-05-15T00:54:32.260212898Z" level=warning msg="cleaning up after shim disconnected" id=e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55 namespace=k8s.io May 15 00:54:32.260306 env[1203]: time="2025-05-15T00:54:32.260288794Z" level=info msg="cleaning up dead shim" May 15 00:54:32.278880 env[1203]: time="2025-05-15T00:54:32.278033730Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:54:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3811 runtime=io.containerd.runc.v2\n" May 15 00:54:32.278880 env[1203]: time="2025-05-15T00:54:32.278396200Z" level=info msg="TearDown network for sandbox \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" successfully" May 15 00:54:32.278880 env[1203]: time="2025-05-15T00:54:32.278416088Z" level=info msg="StopPodSandbox for \"e4833b98d9f312bd7b145660a40a59572bfcbdc16abacad213dbadb2ec4d6e55\" returns successfully" May 15 00:54:32.316970 kubelet[1936]: I0515 00:54:32.314838 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-qhnsc\" (UniqueName: \"kubernetes.io/projected/1e06d30b-a82e-403a-a935-3079c2fba03c-kube-api-access-qhnsc\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.316970 kubelet[1936]: I0515 00:54:32.314882 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-run-calico\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.316970 kubelet[1936]: I0515 00:54:32.314906 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e06d30b-a82e-403a-a935-3079c2fba03c-node-certs\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.316970 kubelet[1936]: I0515 00:54:32.314944 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e06d30b-a82e-403a-a935-3079c2fba03c-tigera-ca-bundle\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.316970 kubelet[1936]: I0515 00:54:32.314958 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-lib-modules\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.316970 kubelet[1936]: I0515 00:54:32.314972 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-lib-calico\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317538 kubelet[1936]: I0515 00:54:32.314984 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-xtables-lock\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317538 kubelet[1936]: I0515 00:54:32.315000 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-log-dir\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317538 kubelet[1936]: I0515 00:54:32.315020 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-net-dir\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317538 kubelet[1936]: I0515 00:54:32.315035 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-bin-dir\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317538 kubelet[1936]: I0515 00:54:32.315057 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-flexvol-driver-host\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317538 kubelet[1936]: I0515 00:54:32.315069 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-policysync\") pod \"1e06d30b-a82e-403a-a935-3079c2fba03c\" (UID: \"1e06d30b-a82e-403a-a935-3079c2fba03c\") " May 15 00:54:32.317695 kubelet[1936]: I0515 00:54:32.315664 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-policysync" (OuterVolumeSpecName: "policysync") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.317695 kubelet[1936]: E0515 00:54:32.316067 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="flexvol-driver" May 15 00:54:32.317695 kubelet[1936]: E0515 00:54:32.316083 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="install-cni" May 15 00:54:32.317695 kubelet[1936]: E0515 00:54:32.316090 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="calico-node" May 15 00:54:32.317695 kubelet[1936]: E0515 00:54:32.316097 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="calico-node" May 15 00:54:32.317695 kubelet[1936]: I0515 00:54:32.316127 1936 memory_manager.go:354] "RemoveStaleState removing state" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="calico-node" May 15 00:54:32.317695 kubelet[1936]: I0515 00:54:32.316137 1936 memory_manager.go:354] "RemoveStaleState removing state" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="calico-node" May 15 00:54:32.317695 kubelet[1936]: E0515 00:54:32.316159 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="calico-node" May 15 00:54:32.317695 kubelet[1936]: I0515 00:54:32.316176 1936 memory_manager.go:354] "RemoveStaleState removing state" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" containerName="calico-node" May 15 00:54:32.318014 kubelet[1936]: I0515 00:54:32.317323 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318014 kubelet[1936]: I0515 00:54:32.317347 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318014 kubelet[1936]: I0515 00:54:32.317635 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318014 kubelet[1936]: I0515 00:54:32.317656 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318014 kubelet[1936]: I0515 00:54:32.317668 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318225 kubelet[1936]: I0515 00:54:32.317679 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318225 kubelet[1936]: I0515 00:54:32.317701 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.318225 kubelet[1936]: I0515 00:54:32.317850 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 00:54:32.323638 kubelet[1936]: I0515 00:54:32.323598 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1e06d30b-a82e-403a-a935-3079c2fba03c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 15 00:54:32.324236 kubelet[1936]: I0515 00:54:32.324208 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1e06d30b-a82e-403a-a935-3079c2fba03c-kube-api-access-qhnsc" (OuterVolumeSpecName: "kube-api-access-qhnsc") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "kube-api-access-qhnsc". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 00:54:32.324347 systemd[1]: var-lib-kubelet-pods-1e06d30b\x2da82e\x2d403a\x2da935\x2d3079c2fba03c-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 00:54:32.324461 systemd[1]: var-lib-kubelet-pods-1e06d30b\x2da82e\x2d403a\x2da935\x2d3079c2fba03c-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 00:54:32.326652 systemd[1]: var-lib-kubelet-pods-1e06d30b\x2da82e\x2d403a\x2da935\x2d3079c2fba03c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dqhnsc.mount: Deactivated successfully. May 15 00:54:32.327576 systemd[1]: Created slice kubepods-besteffort-pod08dcf5e4_3cb1_4eb8_87a2_dd7505bce5a2.slice. May 15 00:54:32.329990 kubelet[1936]: I0515 00:54:32.329934 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1e06d30b-a82e-403a-a935-3079c2fba03c-node-certs" (OuterVolumeSpecName: "node-certs") pod "1e06d30b-a82e-403a-a935-3079c2fba03c" (UID: "1e06d30b-a82e-403a-a935-3079c2fba03c"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 00:54:32.415566 kubelet[1936]: I0515 00:54:32.415513 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-policysync\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415566 kubelet[1936]: I0515 00:54:32.415548 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-cni-net-dir\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415566 kubelet[1936]: I0515 00:54:32.415564 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ksc5z\" (UniqueName: \"kubernetes.io/projected/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-kube-api-access-ksc5z\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415794 kubelet[1936]: I0515 00:54:32.415583 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-cni-bin-dir\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415794 kubelet[1936]: I0515 00:54:32.415644 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-var-run-calico\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415794 kubelet[1936]: I0515 00:54:32.415734 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-cni-log-dir\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415933 kubelet[1936]: I0515 00:54:32.415794 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-tigera-ca-bundle\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415933 kubelet[1936]: I0515 00:54:32.415861 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-lib-modules\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.415933 kubelet[1936]: I0515 00:54:32.415892 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-flexvol-driver-host\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.416040 kubelet[1936]: I0515 00:54:32.415973 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-var-lib-calico\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.416040 kubelet[1936]: I0515 00:54:32.415992 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-xtables-lock\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.416040 kubelet[1936]: I0515 00:54:32.416010 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2-node-certs\") pod \"calico-node-8pt2c\" (UID: \"08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2\") " pod="calico-system/calico-node-8pt2c" May 15 00:54:32.416040 kubelet[1936]: I0515 00:54:32.416040 1936 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e06d30b-a82e-403a-a935-3079c2fba03c-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416050 1936 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-lib-modules\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416060 1936 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416068 1936 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-policysync\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416076 1936 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-qhnsc\" (UniqueName: \"kubernetes.io/projected/1e06d30b-a82e-403a-a935-3079c2fba03c-kube-api-access-qhnsc\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416086 1936 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-lib-calico\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416093 1936 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-xtables-lock\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416111 1936 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-log-dir\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416181 kubelet[1936]: I0515 00:54:32.416129 1936 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-net-dir\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416475 kubelet[1936]: I0515 00:54:32.416138 1936 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416475 kubelet[1936]: I0515 00:54:32.416148 1936 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e06d30b-a82e-403a-a935-3079c2fba03c-var-run-calico\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.416475 kubelet[1936]: I0515 00:54:32.416156 1936 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e06d30b-a82e-403a-a935-3079c2fba03c-node-certs\") on node \"localhost\" DevicePath \"\"" May 15 00:54:32.526358 systemd[1]: Started sshd@18-10.0.0.92:22-10.0.0.1:40530.service. May 15 00:54:32.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.92:22-10.0.0.1:40530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:32.527628 kernel: kauditd_printk_skb: 3 callbacks suppressed May 15 00:54:32.527683 kernel: audit: type=1130 audit(1747270472.525:1145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.92:22-10.0.0.1:40530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:32.553000 audit[3829]: USER_ACCT pid=3829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.554818 sshd[3829]: Accepted publickey for core from 10.0.0.1 port 40530 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:32.559955 kernel: audit: type=1101 audit(1747270472.553:1146): pid=3829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.559000 audit[3829]: CRED_ACQ pid=3829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.560399 sshd[3829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:32.566575 kernel: audit: type=1103 audit(1747270472.559:1147): pid=3829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.566638 kernel: audit: type=1006 audit(1747270472.559:1148): pid=3829 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 15 00:54:32.564965 systemd-logind[1193]: New session 19 of user core. May 15 00:54:32.565348 systemd[1]: Started session-19.scope. May 15 00:54:32.559000 audit[3829]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9bb17230 a2=3 a3=0 items=0 ppid=1 pid=3829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.559000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:32.572941 kernel: audit: type=1300 audit(1747270472.559:1148): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9bb17230 a2=3 a3=0 items=0 ppid=1 pid=3829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.572984 kernel: audit: type=1327 audit(1747270472.559:1148): proctitle=737368643A20636F7265205B707269765D May 15 00:54:32.573013 kernel: audit: type=1105 audit(1747270472.569:1149): pid=3829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.569000 audit[3829]: USER_START pid=3829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.570000 audit[3831]: CRED_ACQ pid=3831 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.581304 kernel: audit: type=1103 audit(1747270472.570:1150): pid=3831 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.631282 kubelet[1936]: E0515 00:54:32.631233 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:32.633581 env[1203]: time="2025-05-15T00:54:32.633171263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8pt2c,Uid:08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2,Namespace:calico-system,Attempt:0,}" May 15 00:54:32.650009 env[1203]: time="2025-05-15T00:54:32.649933862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:32.650009 env[1203]: time="2025-05-15T00:54:32.649973768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:32.650009 env[1203]: time="2025-05-15T00:54:32.649999778Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:32.650232 env[1203]: time="2025-05-15T00:54:32.650171370Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d pid=3847 runtime=io.containerd.runc.v2 May 15 00:54:32.665288 systemd[1]: Started cri-containerd-4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d.scope. May 15 00:54:32.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679960 kernel: audit: type=1400 audit(1747270472.672:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.680141 kernel: audit: type=1400 audit(1747270472.672:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.673000 audit: BPF prog-id=148 op=LOAD May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323931333062333830343665323339366462653432326532366432 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323931333062333830343665323339366462653432326532366432 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit: BPF prog-id=149 op=LOAD May 15 00:54:32.679000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a4b20 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323931333062333830343665323339366462653432326532366432 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit: BPF prog-id=150 op=LOAD May 15 00:54:32.679000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a4b68 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323931333062333830343665323339366462653432326532366432 May 15 00:54:32.679000 audit: BPF prog-id=150 op=UNLOAD May 15 00:54:32.679000 audit: BPF prog-id=149 op=UNLOAD May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.679000 audit: BPF prog-id=151 op=LOAD May 15 00:54:32.679000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a4f78 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466323931333062333830343665323339366462653432326532366432 May 15 00:54:32.690740 sshd[3829]: pam_unix(sshd:session): session closed for user core May 15 00:54:32.692223 env[1203]: time="2025-05-15T00:54:32.692183736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8pt2c,Uid:08dcf5e4-3cb1-4eb8-87a2-dd7505bce5a2,Namespace:calico-system,Attempt:0,} returns sandbox id \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\"" May 15 00:54:32.692809 kubelet[1936]: E0515 00:54:32.692789 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:32.692000 audit[3829]: USER_END pid=3829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.692000 audit[3829]: CRED_DISP pid=3829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:32.694610 env[1203]: time="2025-05-15T00:54:32.694582278Z" level=info msg="CreateContainer within sandbox \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:54:32.694631 systemd[1]: sshd@18-10.0.0.92:22-10.0.0.1:40530.service: Deactivated successfully. May 15 00:54:32.695295 systemd[1]: session-19.scope: Deactivated successfully. May 15 00:54:32.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.92:22-10.0.0.1:40530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:32.696899 systemd-logind[1193]: Session 19 logged out. Waiting for processes to exit. May 15 00:54:32.697578 systemd-logind[1193]: Removed session 19. May 15 00:54:32.714912 env[1203]: time="2025-05-15T00:54:32.714870064Z" level=info msg="CreateContainer within sandbox \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5\"" May 15 00:54:32.715494 env[1203]: time="2025-05-15T00:54:32.715453460Z" level=info msg="StartContainer for \"66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5\"" May 15 00:54:32.730421 systemd[1]: Started cri-containerd-66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5.scope. May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3305fc08e8 items=0 ppid=3847 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653631623234616234333464393531383032386263376636623539 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit: BPF prog-id=152 op=LOAD May 15 00:54:32.744000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000333bd8 items=0 ppid=3847 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653631623234616234333464393531383032386263376636623539 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit: BPF prog-id=153 op=LOAD May 15 00:54:32.744000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000333c28 items=0 ppid=3847 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653631623234616234333464393531383032386263376636623539 May 15 00:54:32.744000 audit: BPF prog-id=153 op=UNLOAD May 15 00:54:32.744000 audit: BPF prog-id=152 op=UNLOAD May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.744000 audit: BPF prog-id=154 op=LOAD May 15 00:54:32.744000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000333cb8 items=0 ppid=3847 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636653631623234616234333464393531383032386263376636623539 May 15 00:54:32.757113 env[1203]: time="2025-05-15T00:54:32.757052148Z" level=info msg="StartContainer for \"66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5\" returns successfully" May 15 00:54:32.768814 systemd[1]: Removed slice kubepods-besteffort-pod1e06d30b_a82e_403a_a935_3079c2fba03c.slice. May 15 00:54:32.770723 systemd[1]: cri-containerd-66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5.scope: Deactivated successfully. May 15 00:54:32.774000 audit: BPF prog-id=154 op=UNLOAD May 15 00:54:32.823190 env[1203]: time="2025-05-15T00:54:32.823079206Z" level=info msg="shim disconnected" id=66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5 May 15 00:54:32.823190 env[1203]: time="2025-05-15T00:54:32.823135434Z" level=warning msg="cleaning up after shim disconnected" id=66e61b24ab434d9518028bc7f6b59b26502dcb2c932b0b88bc25041b9e8589c5 namespace=k8s.io May 15 00:54:32.823190 env[1203]: time="2025-05-15T00:54:32.823147668Z" level=info msg="cleaning up dead shim" May 15 00:54:32.830937 env[1203]: time="2025-05-15T00:54:32.830890450Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:54:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3930 runtime=io.containerd.runc.v2\n" May 15 00:54:32.928145 kubelet[1936]: E0515 00:54:32.928112 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:32.929907 kubelet[1936]: I0515 00:54:32.929800 1936 scope.go:117] "RemoveContainer" containerID="8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c" May 15 00:54:32.931741 env[1203]: time="2025-05-15T00:54:32.931389293Z" level=info msg="CreateContainer within sandbox \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:54:32.933173 env[1203]: time="2025-05-15T00:54:32.933122180Z" level=info msg="RemoveContainer for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\"" May 15 00:54:32.937398 env[1203]: time="2025-05-15T00:54:32.937351175Z" level=info msg="RemoveContainer for \"8bc984c45321efe18819e3a4e570f1e2d684f288bf34c354a3639d0b4cbaa61c\" returns successfully" May 15 00:54:32.937590 kubelet[1936]: I0515 00:54:32.937535 1936 scope.go:117] "RemoveContainer" containerID="d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47" May 15 00:54:32.939498 env[1203]: time="2025-05-15T00:54:32.939465588Z" level=info msg="RemoveContainer for \"d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47\"" May 15 00:54:32.944781 env[1203]: time="2025-05-15T00:54:32.944724945Z" level=info msg="RemoveContainer for \"d25c1a62cc88e949922a65926e6285226242dcba543b1a6f56c3d26da33c2a47\" returns successfully" May 15 00:54:32.947275 kubelet[1936]: I0515 00:54:32.947252 1936 scope.go:117] "RemoveContainer" containerID="023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317" May 15 00:54:32.948519 env[1203]: time="2025-05-15T00:54:32.948488943Z" level=info msg="RemoveContainer for \"023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317\"" May 15 00:54:32.956019 env[1203]: time="2025-05-15T00:54:32.955959238Z" level=info msg="RemoveContainer for \"023c0bfc6664239799e72f0544c32db6eabd39d7f4a9e6cbcd69099f37a56317\" returns successfully" May 15 00:54:32.959680 env[1203]: time="2025-05-15T00:54:32.959606821Z" level=info msg="CreateContainer within sandbox \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1\"" May 15 00:54:32.960836 env[1203]: time="2025-05-15T00:54:32.960787952Z" level=info msg="StartContainer for \"05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1\"" May 15 00:54:32.975957 systemd[1]: Started cri-containerd-05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1.scope. May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f624cd5cd58 items=0 ppid=3847 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035313137663263626336656465383632313332393632383338613839 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit: BPF prog-id=155 op=LOAD May 15 00:54:32.988000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c00038fc58 items=0 ppid=3847 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035313137663263626336656465383632313332393632383338613839 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit: BPF prog-id=156 op=LOAD May 15 00:54:32.988000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c00038fca8 items=0 ppid=3847 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035313137663263626336656465383632313332393632383338613839 May 15 00:54:32.988000 audit: BPF prog-id=156 op=UNLOAD May 15 00:54:32.988000 audit: BPF prog-id=155 op=UNLOAD May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:32.988000 audit: BPF prog-id=157 op=LOAD May 15 00:54:32.988000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c00038fd38 items=0 ppid=3847 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:32.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035313137663263626336656465383632313332393632383338613839 May 15 00:54:33.107772 env[1203]: time="2025-05-15T00:54:33.107648720Z" level=info msg="StartContainer for \"05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1\" returns successfully" May 15 00:54:33.421743 systemd[1]: cri-containerd-05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1.scope: Deactivated successfully. May 15 00:54:33.426000 audit: BPF prog-id=157 op=UNLOAD May 15 00:54:33.438227 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1-rootfs.mount: Deactivated successfully. May 15 00:54:33.443564 env[1203]: time="2025-05-15T00:54:33.443509711Z" level=info msg="shim disconnected" id=05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1 May 15 00:54:33.443564 env[1203]: time="2025-05-15T00:54:33.443564927Z" level=warning msg="cleaning up after shim disconnected" id=05117f2cbc6ede862132962838a8932816594ba3c9df36e270632976eecabae1 namespace=k8s.io May 15 00:54:33.443929 env[1203]: time="2025-05-15T00:54:33.443573874Z" level=info msg="cleaning up dead shim" May 15 00:54:33.449385 env[1203]: time="2025-05-15T00:54:33.449353967Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:54:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3997 runtime=io.containerd.runc.v2\n" May 15 00:54:33.934242 kubelet[1936]: E0515 00:54:33.934209 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:33.945178 env[1203]: time="2025-05-15T00:54:33.945142326Z" level=info msg="CreateContainer within sandbox \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:54:33.957283 env[1203]: time="2025-05-15T00:54:33.957224408Z" level=info msg="CreateContainer within sandbox \"4f29130b38046e2396dbe422e26d2aa63d9fcbacd11022aa75b73ba425d6034d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7a7067de651c466939680125c5cc2df57da57765e42181e50b293f4bcb519b9e\"" May 15 00:54:33.957691 env[1203]: time="2025-05-15T00:54:33.957660390Z" level=info msg="StartContainer for \"7a7067de651c466939680125c5cc2df57da57765e42181e50b293f4bcb519b9e\"" May 15 00:54:33.971024 systemd[1]: Started cri-containerd-7a7067de651c466939680125c5cc2df57da57765e42181e50b293f4bcb519b9e.scope. May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3bc1cfbf08 items=0 ppid=3847 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:33.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373036376465363531633436363933393638303132356335636332 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit: BPF prog-id=158 op=LOAD May 15 00:54:33.986000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038bc58 items=0 ppid=3847 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:33.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373036376465363531633436363933393638303132356335636332 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit: BPF prog-id=159 op=LOAD May 15 00:54:33.986000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038bca8 items=0 ppid=3847 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:33.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373036376465363531633436363933393638303132356335636332 May 15 00:54:33.986000 audit: BPF prog-id=159 op=UNLOAD May 15 00:54:33.986000 audit: BPF prog-id=158 op=UNLOAD May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:33.986000 audit: BPF prog-id=160 op=LOAD May 15 00:54:33.986000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038bd38 items=0 ppid=3847 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:33.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373036376465363531633436363933393638303132356335636332 May 15 00:54:34.003847 env[1203]: time="2025-05-15T00:54:34.003806764Z" level=info msg="StartContainer for \"7a7067de651c466939680125c5cc2df57da57765e42181e50b293f4bcb519b9e\" returns successfully" May 15 00:54:34.766314 kubelet[1936]: I0515 00:54:34.766260 1936 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="1e06d30b-a82e-403a-a935-3079c2fba03c" path="/var/lib/kubelet/pods/1e06d30b-a82e-403a-a935-3079c2fba03c/volumes" May 15 00:54:34.937731 kubelet[1936]: E0515 00:54:34.937691 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:35.225000 audit[4141]: AVC avc: denied { write } for pid=4141 comm="tee" name="fd" dev="proc" ino=27254 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.225000 audit[4141]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdee3e0a2c a2=241 a3=1b6 items=1 ppid=4103 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.225000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 00:54:35.225000 audit: PATH item=0 name="/dev/fd/63" inode=26527 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.225000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.234000 audit[4163]: AVC avc: denied { write } for pid=4163 comm="tee" name="fd" dev="proc" ino=25462 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.234000 audit[4163]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf947aa2b a2=241 a3=1b6 items=1 ppid=4109 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.234000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 00:54:35.234000 audit: PATH item=0 name="/dev/fd/63" inode=27260 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.234000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.241000 audit[4161]: AVC avc: denied { write } for pid=4161 comm="tee" name="fd" dev="proc" ino=27269 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.241000 audit[4161]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2f411a2a a2=241 a3=1b6 items=1 ppid=4104 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.241000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 00:54:35.241000 audit: PATH item=0 name="/dev/fd/63" inode=27257 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.241000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.255000 audit[4170]: AVC avc: denied { write } for pid=4170 comm="tee" name="fd" dev="proc" ino=27273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.257000 audit[4176]: AVC avc: denied { write } for pid=4176 comm="tee" name="fd" dev="proc" ino=24408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.257000 audit[4176]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9ade8a2a a2=241 a3=1b6 items=1 ppid=4114 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.257000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 00:54:35.257000 audit: PATH item=0 name="/dev/fd/63" inode=26535 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.257000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.258000 audit[4179]: AVC avc: denied { write } for pid=4179 comm="tee" name="fd" dev="proc" ino=26541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.258000 audit[4179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc29ca4a1b a2=241 a3=1b6 items=1 ppid=4105 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.258000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 00:54:35.258000 audit: PATH item=0 name="/dev/fd/63" inode=26538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.255000 audit[4170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1c235a2a a2=241 a3=1b6 items=1 ppid=4110 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.255000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 00:54:35.255000 audit: PATH item=0 name="/dev/fd/63" inode=24404 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.255000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.276000 audit[4185]: AVC avc: denied { write } for pid=4185 comm="tee" name="fd" dev="proc" ino=24412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:54:35.276000 audit[4185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd33fd6a1a a2=241 a3=1b6 items=1 ppid=4116 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.276000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 00:54:35.276000 audit: PATH item=0 name="/dev/fd/63" inode=25467 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:54:35.276000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit: BPF prog-id=161 op=LOAD May 15 00:54:35.356000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9f3c9cf0 a2=98 a3=3 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.356000 audit: BPF prog-id=161 op=UNLOAD May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit: BPF prog-id=162 op=LOAD May 15 00:54:35.356000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9f3c9ad0 a2=74 a3=540051 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.356000 audit: BPF prog-id=162 op=UNLOAD May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.356000 audit: BPF prog-id=163 op=LOAD May 15 00:54:35.356000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9f3c9b00 a2=94 a3=2 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.356000 audit: BPF prog-id=163 op=UNLOAD May 15 00:54:35.461000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit: BPF prog-id=164 op=LOAD May 15 00:54:35.461000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9f3c99c0 a2=40 a3=1 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.461000 audit: BPF prog-id=164 op=UNLOAD May 15 00:54:35.461000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.461000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9f3c9a90 a2=50 a3=7ffc9f3c9b70 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9f3c99d0 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9f3c9a00 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9f3c9910 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9f3c9a20 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9f3c9a00 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9f3c99f0 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9f3c9a20 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9f3c9a00 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9f3c9a20 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9f3c99f0 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9f3c9a60 a2=28 a3=0 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9f3c9810 a2=50 a3=1 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit: BPF prog-id=165 op=LOAD May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9f3c9810 a2=94 a3=5 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit: BPF prog-id=165 op=UNLOAD May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9f3c98c0 a2=50 a3=1 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9f3c99e0 a2=4 a3=38 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.469000 audit[4216]: AVC avc: denied { confidentiality } for pid=4216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:54:35.469000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9f3c9a30 a2=94 a3=6 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { confidentiality } for pid=4216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:54:35.470000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9f3c91e0 a2=94 a3=83 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.470000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.470000 audit[4216]: AVC avc: denied { confidentiality } for pid=4216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:54:35.470000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9f3c91e0 a2=94 a3=83 items=0 ppid=4115 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.470000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit: BPF prog-id=166 op=LOAD May 15 00:54:35.477000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe53316510 a2=98 a3=1999999999999999 items=0 ppid=4115 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.477000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:54:35.477000 audit: BPF prog-id=166 op=UNLOAD May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit: BPF prog-id=167 op=LOAD May 15 00:54:35.477000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe533163f0 a2=74 a3=ffff items=0 ppid=4115 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.477000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:54:35.477000 audit: BPF prog-id=167 op=UNLOAD May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.477000 audit: BPF prog-id=168 op=LOAD May 15 00:54:35.477000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe53316430 a2=40 a3=7ffe53316610 items=0 ppid=4115 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.477000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:54:35.477000 audit: BPF prog-id=168 op=UNLOAD May 15 00:54:35.515640 systemd-networkd[1026]: vxlan.calico: Link UP May 15 00:54:35.515648 systemd-networkd[1026]: vxlan.calico: Gained carrier May 15 00:54:35.532000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.532000 audit: BPF prog-id=169 op=LOAD May 15 00:54:35.532000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbccf77c0 a2=98 a3=ffffffff items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.533000 audit: BPF prog-id=169 op=UNLOAD May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit: BPF prog-id=170 op=LOAD May 15 00:54:35.533000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbccf75d0 a2=74 a3=540051 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.533000 audit: BPF prog-id=170 op=UNLOAD May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit: BPF prog-id=171 op=LOAD May 15 00:54:35.533000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbccf7600 a2=94 a3=2 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.533000 audit: BPF prog-id=171 op=UNLOAD May 15 00:54:35.533000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.533000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbccf74d0 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbccf7500 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbccf7410 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbccf7520 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbccf7500 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbccf74f0 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbccf7520 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbccf7500 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbccf7520 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbccf74f0 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbccf7560 a2=28 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit: BPF prog-id=172 op=LOAD May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbccf73d0 a2=40 a3=0 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit: BPF prog-id=172 op=UNLOAD May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdbccf73c0 a2=50 a3=2800 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdbccf73c0 a2=50 a3=2800 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit: BPF prog-id=173 op=LOAD May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbccf6be0 a2=94 a3=2 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.534000 audit: BPF prog-id=173 op=UNLOAD May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.534000 audit: BPF prog-id=174 op=LOAD May 15 00:54:35.534000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbccf6ce0 a2=94 a3=30 items=0 ppid=4115 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit: BPF prog-id=175 op=LOAD May 15 00:54:35.540000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb222f6f0 a2=98 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.540000 audit: BPF prog-id=175 op=UNLOAD May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit: BPF prog-id=176 op=LOAD May 15 00:54:35.540000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb222f4d0 a2=74 a3=540051 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.540000 audit: BPF prog-id=176 op=UNLOAD May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.540000 audit: BPF prog-id=177 op=LOAD May 15 00:54:35.540000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb222f500 a2=94 a3=2 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.540000 audit: BPF prog-id=177 op=UNLOAD May 15 00:54:35.645000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit: BPF prog-id=178 op=LOAD May 15 00:54:35.645000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb222f3c0 a2=40 a3=1 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.645000 audit: BPF prog-id=178 op=UNLOAD May 15 00:54:35.645000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.645000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb222f490 a2=50 a3=7ffdb222f570 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb222f3d0 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb222f400 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb222f310 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb222f420 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb222f400 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb222f3f0 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb222f420 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb222f400 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb222f420 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb222f3f0 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb222f460 a2=28 a3=0 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb222f210 a2=50 a3=1 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit: BPF prog-id=179 op=LOAD May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb222f210 a2=94 a3=5 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit: BPF prog-id=179 op=UNLOAD May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb222f2c0 a2=50 a3=1 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdb222f3e0 a2=4 a3=38 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.652000 audit[4257]: AVC avc: denied { confidentiality } for pid=4257 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:54:35.652000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb222f430 a2=94 a3=6 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { confidentiality } for pid=4257 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:54:35.653000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb222ebe0 a2=94 a3=83 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { confidentiality } for pid=4257 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:54:35.653000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb222ebe0 a2=94 a3=83 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb2230620 a2=10 a3=208 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb22304c0 a2=10 a3=3 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb2230460 a2=10 a3=3 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.653000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:35.653000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb2230460 a2=10 a3=7 items=0 ppid=4115 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:54:35.660000 audit: BPF prog-id=174 op=UNLOAD May 15 00:54:35.697000 audit[4286]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:35.697000 audit[4286]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdffdfec60 a2=0 a3=7ffdffdfec4c items=0 ppid=4115 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.697000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:35.702000 audit[4285]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4285 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:35.702000 audit[4285]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffec17fc100 a2=0 a3=7ffec17fc0ec items=0 ppid=4115 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.702000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:35.703000 audit[4289]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:35.703000 audit[4289]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff19b0e610 a2=0 a3=7fff19b0e5fc items=0 ppid=4115 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.703000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:35.706000 audit[4284]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:35.706000 audit[4284]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff5c9c0560 a2=0 a3=7fff5c9c054c items=0 ppid=4115 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:35.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:35.939833 kubelet[1936]: E0515 00:54:35.939512 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:35.955813 systemd[1]: run-containerd-runc-k8s.io-7a7067de651c466939680125c5cc2df57da57765e42181e50b293f4bcb519b9e-runc.tWuqm4.mount: Deactivated successfully. May 15 00:54:36.764980 env[1203]: time="2025-05-15T00:54:36.764553644Z" level=info msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\"" May 15 00:54:36.807796 kubelet[1936]: I0515 00:54:36.807743 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-8pt2c" podStartSLOduration=4.807724378 podStartE2EDuration="4.807724378s" podCreationTimestamp="2025-05-15 00:54:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:54:34.951926656 +0000 UTC m=+74.259748434" watchObservedRunningTime="2025-05-15 00:54:36.807724378 +0000 UTC m=+76.115546156" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.807 [INFO][4333] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.807 [INFO][4333] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" iface="eth0" netns="/var/run/netns/cni-5880ab2a-51fc-2ab9-0acc-3087442b2297" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.808 [INFO][4333] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" iface="eth0" netns="/var/run/netns/cni-5880ab2a-51fc-2ab9-0acc-3087442b2297" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.808 [INFO][4333] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" iface="eth0" netns="/var/run/netns/cni-5880ab2a-51fc-2ab9-0acc-3087442b2297" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.808 [INFO][4333] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.808 [INFO][4333] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.827 [INFO][4341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" HandleID="k8s-pod-network.0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" Workload="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.828 [INFO][4341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.828 [INFO][4341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.833 [WARNING][4341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" HandleID="k8s-pod-network.0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" Workload="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.833 [INFO][4341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" HandleID="k8s-pod-network.0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" Workload="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.835 [INFO][4341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:36.838033 env[1203]: 2025-05-15 00:54:36.836 [INFO][4333] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78" May 15 00:54:36.838471 env[1203]: time="2025-05-15T00:54:36.838209789Z" level=info msg="TearDown network for sandbox \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\" successfully" May 15 00:54:36.838471 env[1203]: time="2025-05-15T00:54:36.838248203Z" level=info msg="StopPodSandbox for \"0a9f61c6c17f6347806b61d3edf165e32f2c5b1471ab950b81092b6caca4ec78\" returns successfully" May 15 00:54:36.839095 env[1203]: time="2025-05-15T00:54:36.839056839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-xznmm,Uid:4cd3b8f2-79a6-432c-85dc-154ddf0fc558,Namespace:calico-apiserver,Attempt:1,}" May 15 00:54:36.840313 systemd[1]: run-netns-cni\x2d5880ab2a\x2d51fc\x2d2ab9\x2d0acc\x2d3087442b2297.mount: Deactivated successfully. May 15 00:54:36.937754 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:54:36.937854 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0271466c4d: link becomes ready May 15 00:54:36.939304 systemd-networkd[1026]: calia0271466c4d: Link UP May 15 00:54:36.939448 systemd-networkd[1026]: calia0271466c4d: Gained carrier May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.881 [INFO][4348] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0 calico-apiserver-77c7f9db84- calico-apiserver 4cd3b8f2-79a6-432c-85dc-154ddf0fc558 1106 0 2025-05-15 00:53:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77c7f9db84 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-77c7f9db84-xznmm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia0271466c4d [] []}} ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.882 [INFO][4348] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.904 [INFO][4361] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" HandleID="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Workload="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.910 [INFO][4361] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" HandleID="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Workload="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005bdb10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-77c7f9db84-xznmm", "timestamp":"2025-05-15 00:54:36.904121614 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.910 [INFO][4361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.910 [INFO][4361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.910 [INFO][4361] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.912 [INFO][4361] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.915 [INFO][4361] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.917 [INFO][4361] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.919 [INFO][4361] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.921 [INFO][4361] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.921 [INFO][4361] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.922 [INFO][4361] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.926 [INFO][4361] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.931 [INFO][4361] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.931 [INFO][4361] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" host="localhost" May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.931 [INFO][4361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:36.948411 env[1203]: 2025-05-15 00:54:36.931 [INFO][4361] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" HandleID="k8s-pod-network.1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Workload="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.949008 env[1203]: 2025-05-15 00:54:36.934 [INFO][4348] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0", GenerateName:"calico-apiserver-77c7f9db84-", Namespace:"calico-apiserver", SelfLink:"", UID:"4cd3b8f2-79a6-432c-85dc-154ddf0fc558", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77c7f9db84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-77c7f9db84-xznmm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia0271466c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:36.949008 env[1203]: 2025-05-15 00:54:36.934 [INFO][4348] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.949008 env[1203]: 2025-05-15 00:54:36.934 [INFO][4348] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia0271466c4d ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.949008 env[1203]: 2025-05-15 00:54:36.938 [INFO][4348] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.949008 env[1203]: 2025-05-15 00:54:36.938 [INFO][4348] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0", GenerateName:"calico-apiserver-77c7f9db84-", Namespace:"calico-apiserver", SelfLink:"", UID:"4cd3b8f2-79a6-432c-85dc-154ddf0fc558", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77c7f9db84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e", Pod:"calico-apiserver-77c7f9db84-xznmm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia0271466c4d", MAC:"56:87:06:35:41:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:36.949008 env[1203]: 2025-05-15 00:54:36.946 [INFO][4348] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-xznmm" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--xznmm-eth0" May 15 00:54:36.956000 audit[4384]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:36.956000 audit[4384]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffd9abd0600 a2=0 a3=7ffd9abd05ec items=0 ppid=4115 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:36.956000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:36.963817 env[1203]: time="2025-05-15T00:54:36.963711488Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:36.963817 env[1203]: time="2025-05-15T00:54:36.963768929Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:36.963817 env[1203]: time="2025-05-15T00:54:36.963779610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:36.964194 env[1203]: time="2025-05-15T00:54:36.964140916Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e pid=4392 runtime=io.containerd.runc.v2 May 15 00:54:36.980886 systemd[1]: Started cri-containerd-1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e.scope. May 15 00:54:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.988000 audit: BPF prog-id=180 op=LOAD May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4392 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:36.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165333036613030396161343265313761393538616463316334346663 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4392 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:36.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165333036613030396161343265313761393538616463316334346663 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit: BPF prog-id=181 op=LOAD May 15 00:54:36.989000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003f4010 items=0 ppid=4392 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:36.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165333036613030396161343265313761393538616463316334346663 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit: BPF prog-id=182 op=LOAD May 15 00:54:36.989000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003f4058 items=0 ppid=4392 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:36.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165333036613030396161343265313761393538616463316334346663 May 15 00:54:36.989000 audit: BPF prog-id=182 op=UNLOAD May 15 00:54:36.989000 audit: BPF prog-id=181 op=UNLOAD May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:36.989000 audit: BPF prog-id=183 op=LOAD May 15 00:54:36.989000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f4468 items=0 ppid=4392 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:36.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165333036613030396161343265313761393538616463316334346663 May 15 00:54:36.991250 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:54:37.011155 env[1203]: time="2025-05-15T00:54:37.011116470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-xznmm,Uid:4cd3b8f2-79a6-432c-85dc-154ddf0fc558,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e\"" May 15 00:54:37.013910 env[1203]: time="2025-05-15T00:54:37.013228113Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 00:54:37.341059 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL May 15 00:54:37.695134 systemd[1]: Started sshd@19-10.0.0.92:22-10.0.0.1:40532.service. May 15 00:54:37.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.92:22-10.0.0.1:40532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:37.696465 kernel: kauditd_printk_skb: 764 callbacks suppressed May 15 00:54:37.696498 kernel: audit: type=1130 audit(1747270477.694:1313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.92:22-10.0.0.1:40532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:37.725000 audit[4429]: USER_ACCT pid=4429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.726665 sshd[4429]: Accepted publickey for core from 10.0.0.1 port 40532 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:37.728437 sshd[4429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:37.727000 audit[4429]: CRED_ACQ pid=4429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.732047 systemd-logind[1193]: New session 20 of user core. May 15 00:54:37.732732 systemd[1]: Started session-20.scope. May 15 00:54:37.736543 kernel: audit: type=1101 audit(1747270477.725:1314): pid=4429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.736602 kernel: audit: type=1103 audit(1747270477.727:1315): pid=4429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.736619 kernel: audit: type=1006 audit(1747270477.727:1316): pid=4429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 15 00:54:37.739681 kernel: audit: type=1300 audit(1747270477.727:1316): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5033b3f0 a2=3 a3=0 items=0 ppid=1 pid=4429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:37.727000 audit[4429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5033b3f0 a2=3 a3=0 items=0 ppid=1 pid=4429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:37.727000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:37.747045 kernel: audit: type=1327 audit(1747270477.727:1316): proctitle=737368643A20636F7265205B707269765D May 15 00:54:37.747093 kernel: audit: type=1105 audit(1747270477.736:1317): pid=4429 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.736000 audit[4429]: USER_START pid=4429 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.737000 audit[4431]: CRED_ACQ pid=4431 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.757406 kernel: audit: type=1103 audit(1747270477.737:1318): pid=4431 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.765199 env[1203]: time="2025-05-15T00:54:37.765157920Z" level=info msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\"" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.830 [INFO][4450] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.830 [INFO][4450] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" iface="eth0" netns="/var/run/netns/cni-1da7f2c4-870f-4fde-3274-17943a43f30d" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.830 [INFO][4450] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" iface="eth0" netns="/var/run/netns/cni-1da7f2c4-870f-4fde-3274-17943a43f30d" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.830 [INFO][4450] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" iface="eth0" netns="/var/run/netns/cni-1da7f2c4-870f-4fde-3274-17943a43f30d" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.830 [INFO][4450] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.830 [INFO][4450] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.883 [INFO][4467] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" HandleID="k8s-pod-network.21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" Workload="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.883 [INFO][4467] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.883 [INFO][4467] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.888 [WARNING][4467] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" HandleID="k8s-pod-network.21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" Workload="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.888 [INFO][4467] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" HandleID="k8s-pod-network.21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" Workload="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.889 [INFO][4467] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:37.893559 env[1203]: 2025-05-15 00:54:37.892 [INFO][4450] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80" May 15 00:54:37.895143 sshd[4429]: pam_unix(sshd:session): session closed for user core May 15 00:54:37.895738 systemd[1]: run-netns-cni\x2d1da7f2c4\x2d870f\x2d4fde\x2d3274\x2d17943a43f30d.mount: Deactivated successfully. May 15 00:54:37.895000 audit[4429]: USER_END pid=4429 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.896000 audit[4429]: CRED_DISP pid=4429 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.900607 env[1203]: time="2025-05-15T00:54:37.900492981Z" level=info msg="TearDown network for sandbox \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\" successfully" May 15 00:54:37.900607 env[1203]: time="2025-05-15T00:54:37.900525553Z" level=info msg="StopPodSandbox for \"21b2eee37ae9ec0e62741fa3ce1af62ed831960120e1f2f26f36350ed9c05e80\" returns successfully" May 15 00:54:37.900828 kubelet[1936]: E0515 00:54:37.900800 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:37.900811 systemd[1]: sshd@19-10.0.0.92:22-10.0.0.1:40532.service: Deactivated successfully. May 15 00:54:37.901318 systemd[1]: session-20.scope: Deactivated successfully. May 15 00:54:37.902001 env[1203]: time="2025-05-15T00:54:37.901793864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-67h7f,Uid:514e78d1-5d35-4539-8295-ce066920cfd6,Namespace:kube-system,Attempt:1,}" May 15 00:54:37.901966 systemd-logind[1193]: Session 20 logged out. Waiting for processes to exit. May 15 00:54:37.902547 systemd-logind[1193]: Removed session 20. May 15 00:54:37.903941 kernel: audit: type=1106 audit(1747270477.895:1319): pid=4429 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.903994 kernel: audit: type=1104 audit(1747270477.896:1320): pid=4429 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:37.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.92:22-10.0.0.1:40532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:38.015802 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:54:38.015902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec8fe9ac01e: link becomes ready May 15 00:54:38.013642 systemd-networkd[1026]: caliec8fe9ac01e: Link UP May 15 00:54:38.015870 systemd-networkd[1026]: caliec8fe9ac01e: Gained carrier May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.963 [INFO][4477] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--67h7f-eth0 coredns-6f6b679f8f- kube-system 514e78d1-5d35-4539-8295-ce066920cfd6 1114 0 2025-05-15 00:53:25 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-67h7f eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliec8fe9ac01e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.963 [INFO][4477] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.985 [INFO][4492] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" HandleID="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Workload="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.991 [INFO][4492] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" HandleID="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Workload="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030c8c0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-67h7f", "timestamp":"2025-05-15 00:54:37.985101569 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.991 [INFO][4492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.992 [INFO][4492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.992 [INFO][4492] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.993 [INFO][4492] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.996 [INFO][4492] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:37.999 [INFO][4492] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.000 [INFO][4492] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.001 [INFO][4492] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.001 [INFO][4492] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.002 [INFO][4492] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406 May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.005 [INFO][4492] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.009 [INFO][4492] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.009 [INFO][4492] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" host="localhost" May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.009 [INFO][4492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:38.027611 env[1203]: 2025-05-15 00:54:38.009 [INFO][4492] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" HandleID="k8s-pod-network.30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Workload="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.028199 env[1203]: 2025-05-15 00:54:38.011 [INFO][4477] cni-plugin/k8s.go 386: Populated endpoint ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--67h7f-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"514e78d1-5d35-4539-8295-ce066920cfd6", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-67h7f", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliec8fe9ac01e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:38.028199 env[1203]: 2025-05-15 00:54:38.011 [INFO][4477] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.028199 env[1203]: 2025-05-15 00:54:38.011 [INFO][4477] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec8fe9ac01e ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.028199 env[1203]: 2025-05-15 00:54:38.015 [INFO][4477] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.028199 env[1203]: 2025-05-15 00:54:38.016 [INFO][4477] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--67h7f-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"514e78d1-5d35-4539-8295-ce066920cfd6", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406", Pod:"coredns-6f6b679f8f-67h7f", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliec8fe9ac01e", MAC:"06:d8:28:c1:9d:6d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:38.028199 env[1203]: 2025-05-15 00:54:38.026 [INFO][4477] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406" Namespace="kube-system" Pod="coredns-6f6b679f8f-67h7f" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--67h7f-eth0" May 15 00:54:38.031000 audit[4513]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:38.031000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe565d8110 a2=0 a3=7ffe565d80fc items=0 ppid=4115 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.031000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:38.037533 env[1203]: time="2025-05-15T00:54:38.037471476Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:38.037533 env[1203]: time="2025-05-15T00:54:38.037515731Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:38.037633 env[1203]: time="2025-05-15T00:54:38.037530570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:38.037813 env[1203]: time="2025-05-15T00:54:38.037774449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406 pid=4521 runtime=io.containerd.runc.v2 May 15 00:54:38.049583 systemd[1]: run-containerd-runc-k8s.io-30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406-runc.aAXHDk.mount: Deactivated successfully. May 15 00:54:38.053741 systemd[1]: Started cri-containerd-30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406.scope. May 15 00:54:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit: BPF prog-id=184 op=LOAD May 15 00:54:38.060000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.060000 audit[4530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4521 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663537306138363835326239393337393361383831633834666531 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4521 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663537306138363835326239393337393361383831633834666531 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit: BPF prog-id=185 op=LOAD May 15 00:54:38.061000 audit[4530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00038c6d0 items=0 ppid=4521 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663537306138363835326239393337393361383831633834666531 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit: BPF prog-id=186 op=LOAD May 15 00:54:38.061000 audit[4530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00038c718 items=0 ppid=4521 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663537306138363835326239393337393361383831633834666531 May 15 00:54:38.061000 audit: BPF prog-id=186 op=UNLOAD May 15 00:54:38.061000 audit: BPF prog-id=185 op=UNLOAD May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { perfmon } for pid=4530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit[4530]: AVC avc: denied { bpf } for pid=4530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.061000 audit: BPF prog-id=187 op=LOAD May 15 00:54:38.061000 audit[4530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00038cb28 items=0 ppid=4521 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663537306138363835326239393337393361383831633834666531 May 15 00:54:38.063019 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:54:38.081704 env[1203]: time="2025-05-15T00:54:38.081651798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-67h7f,Uid:514e78d1-5d35-4539-8295-ce066920cfd6,Namespace:kube-system,Attempt:1,} returns sandbox id \"30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406\"" May 15 00:54:38.082278 kubelet[1936]: E0515 00:54:38.082257 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:38.084235 env[1203]: time="2025-05-15T00:54:38.084191220Z" level=info msg="CreateContainer within sandbox \"30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 00:54:38.100448 env[1203]: time="2025-05-15T00:54:38.100404011Z" level=info msg="CreateContainer within sandbox \"30f570a86852b993793a881c84fe1fff26593a0dfeb7e5a3009ff6e7f236f406\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"875bf1e5d8631114c4066e80f9691efbd90859d85004d7667b18cc0129b8a00b\"" May 15 00:54:38.100801 env[1203]: time="2025-05-15T00:54:38.100772389Z" level=info msg="StartContainer for \"875bf1e5d8631114c4066e80f9691efbd90859d85004d7667b18cc0129b8a00b\"" May 15 00:54:38.113600 systemd[1]: Started cri-containerd-875bf1e5d8631114c4066e80f9691efbd90859d85004d7667b18cc0129b8a00b.scope. May 15 00:54:38.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.123000 audit: BPF prog-id=188 op=LOAD May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4521 pid=4562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356266316535643836333131313463343036366538306639363931 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4521 pid=4562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356266316535643836333131313463343036366538306639363931 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit: BPF prog-id=189 op=LOAD May 15 00:54:38.124000 audit[4562]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032aa70 items=0 ppid=4521 pid=4562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356266316535643836333131313463343036366538306639363931 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit: BPF prog-id=190 op=LOAD May 15 00:54:38.124000 audit[4562]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032aab8 items=0 ppid=4521 pid=4562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356266316535643836333131313463343036366538306639363931 May 15 00:54:38.124000 audit: BPF prog-id=190 op=UNLOAD May 15 00:54:38.124000 audit: BPF prog-id=189 op=UNLOAD May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { perfmon } for pid=4562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit[4562]: AVC avc: denied { bpf } for pid=4562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:38.124000 audit: BPF prog-id=191 op=LOAD May 15 00:54:38.124000 audit[4562]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032aec8 items=0 ppid=4521 pid=4562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:38.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356266316535643836333131313463343036366538306639363931 May 15 00:54:38.135074 env[1203]: time="2025-05-15T00:54:38.135022117Z" level=info msg="StartContainer for \"875bf1e5d8631114c4066e80f9691efbd90859d85004d7667b18cc0129b8a00b\" returns successfully" May 15 00:54:38.621108 systemd-networkd[1026]: calia0271466c4d: Gained IPv6LL May 15 00:54:38.764824 env[1203]: time="2025-05-15T00:54:38.764779033Z" level=info msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\"" May 15 00:54:38.765621 env[1203]: time="2025-05-15T00:54:38.765571938Z" level=info msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\"" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.819 [INFO][4633] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.819 [INFO][4633] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" iface="eth0" netns="/var/run/netns/cni-c5315528-4b72-b21a-c110-afb2f36f247f" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.820 [INFO][4633] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" iface="eth0" netns="/var/run/netns/cni-c5315528-4b72-b21a-c110-afb2f36f247f" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.820 [INFO][4633] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" iface="eth0" netns="/var/run/netns/cni-c5315528-4b72-b21a-c110-afb2f36f247f" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.820 [INFO][4633] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.820 [INFO][4633] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.847 [INFO][4646] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" HandleID="k8s-pod-network.d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" Workload="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.847 [INFO][4646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.848 [INFO][4646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.853 [WARNING][4646] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" HandleID="k8s-pod-network.d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" Workload="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.853 [INFO][4646] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" HandleID="k8s-pod-network.d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" Workload="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.855 [INFO][4646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:38.857763 env[1203]: 2025-05-15 00:54:38.856 [INFO][4633] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415" May 15 00:54:38.858314 env[1203]: time="2025-05-15T00:54:38.858021221Z" level=info msg="TearDown network for sandbox \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\" successfully" May 15 00:54:38.858314 env[1203]: time="2025-05-15T00:54:38.858059946Z" level=info msg="StopPodSandbox for \"d809d8cd2ddb01b324361a554063246acaa40b302b031dc79a9df24402ff2415\" returns successfully" May 15 00:54:38.858874 env[1203]: time="2025-05-15T00:54:38.858780421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b8f5d494-8w5fd,Uid:b6b6552b-76ab-48e5-ad1c-6f738c64971c,Namespace:calico-system,Attempt:1,}" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.814 [INFO][4627] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.815 [INFO][4627] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" iface="eth0" netns="/var/run/netns/cni-30ffcd30-8e4f-1b9f-1706-52b45fb6666f" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.815 [INFO][4627] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" iface="eth0" netns="/var/run/netns/cni-30ffcd30-8e4f-1b9f-1706-52b45fb6666f" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.815 [INFO][4627] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" iface="eth0" netns="/var/run/netns/cni-30ffcd30-8e4f-1b9f-1706-52b45fb6666f" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.815 [INFO][4627] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.815 [INFO][4627] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.857 [INFO][4644] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" HandleID="k8s-pod-network.0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" Workload="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.858 [INFO][4644] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.858 [INFO][4644] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.865 [WARNING][4644] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" HandleID="k8s-pod-network.0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" Workload="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.865 [INFO][4644] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" HandleID="k8s-pod-network.0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" Workload="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.866 [INFO][4644] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:38.869180 env[1203]: 2025-05-15 00:54:38.867 [INFO][4627] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8" May 15 00:54:38.869723 env[1203]: time="2025-05-15T00:54:38.869323161Z" level=info msg="TearDown network for sandbox \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\" successfully" May 15 00:54:38.869723 env[1203]: time="2025-05-15T00:54:38.869355674Z" level=info msg="StopPodSandbox for \"0e194df7adebab1ca8c0875c57afa0a1a9c7bad464100eb2b0eb8d9f091f38d8\" returns successfully" May 15 00:54:38.870024 env[1203]: time="2025-05-15T00:54:38.869995564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vztvt,Uid:d89698cf-ee3e-4bee-bff3-be4ff5bd14cc,Namespace:calico-system,Attempt:1,}" May 15 00:54:38.949934 kubelet[1936]: E0515 00:54:38.949358 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:38.956062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2705882253.mount: Deactivated successfully. May 15 00:54:38.956148 systemd[1]: run-netns-cni\x2d30ffcd30\x2d8e4f\x2d1b9f\x2d1706\x2d52b45fb6666f.mount: Deactivated successfully. May 15 00:54:38.956195 systemd[1]: run-netns-cni\x2dc5315528\x2d4b72\x2db21a\x2dc110\x2dafb2f36f247f.mount: Deactivated successfully. May 15 00:54:38.980332 systemd-networkd[1026]: cali97a6bfbb9ea: Link UP May 15 00:54:38.985961 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali97a6bfbb9ea: link becomes ready May 15 00:54:38.982063 systemd-networkd[1026]: cali97a6bfbb9ea: Gained carrier May 15 00:54:38.987694 kubelet[1936]: I0515 00:54:38.987055 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-67h7f" podStartSLOduration=73.987024254 podStartE2EDuration="1m13.987024254s" podCreationTimestamp="2025-05-15 00:53:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:54:38.970430089 +0000 UTC m=+78.278251867" watchObservedRunningTime="2025-05-15 00:54:38.987024254 +0000 UTC m=+78.294846032" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.906 [INFO][4659] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0 calico-kube-controllers-55b8f5d494- calico-system b6b6552b-76ab-48e5-ad1c-6f738c64971c 1133 0 2025-05-15 00:53:32 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55b8f5d494 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-55b8f5d494-8w5fd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali97a6bfbb9ea [] []}} ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.906 [INFO][4659] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.931 [INFO][4689] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" HandleID="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Workload="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.937 [INFO][4689] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" HandleID="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Workload="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003acd50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-55b8f5d494-8w5fd", "timestamp":"2025-05-15 00:54:38.931278938 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.937 [INFO][4689] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.938 [INFO][4689] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.938 [INFO][4689] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.939 [INFO][4689] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.942 [INFO][4689] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.946 [INFO][4689] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.947 [INFO][4689] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.949 [INFO][4689] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.949 [INFO][4689] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.957 [INFO][4689] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24 May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.962 [INFO][4689] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.968 [INFO][4689] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.969 [INFO][4689] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" host="localhost" May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.969 [INFO][4689] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:38.999954 env[1203]: 2025-05-15 00:54:38.969 [INFO][4689] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" HandleID="k8s-pod-network.73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Workload="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:39.000638 env[1203]: 2025-05-15 00:54:38.973 [INFO][4659] cni-plugin/k8s.go 386: Populated endpoint ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0", GenerateName:"calico-kube-controllers-55b8f5d494-", Namespace:"calico-system", SelfLink:"", UID:"b6b6552b-76ab-48e5-ad1c-6f738c64971c", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55b8f5d494", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-55b8f5d494-8w5fd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali97a6bfbb9ea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:39.000638 env[1203]: 2025-05-15 00:54:38.973 [INFO][4659] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:39.000638 env[1203]: 2025-05-15 00:54:38.973 [INFO][4659] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali97a6bfbb9ea ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:39.000638 env[1203]: 2025-05-15 00:54:38.986 [INFO][4659] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:39.000638 env[1203]: 2025-05-15 00:54:38.988 [INFO][4659] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0", GenerateName:"calico-kube-controllers-55b8f5d494-", Namespace:"calico-system", SelfLink:"", UID:"b6b6552b-76ab-48e5-ad1c-6f738c64971c", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55b8f5d494", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24", Pod:"calico-kube-controllers-55b8f5d494-8w5fd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali97a6bfbb9ea", MAC:"4a:22:93:ba:48:fe", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:39.000638 env[1203]: 2025-05-15 00:54:38.998 [INFO][4659] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24" Namespace="calico-system" Pod="calico-kube-controllers-55b8f5d494-8w5fd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55b8f5d494--8w5fd-eth0" May 15 00:54:39.006000 audit[4711]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:39.006000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe26170280 a2=0 a3=7ffe2617026c items=0 ppid=2081 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:39.018835 env[1203]: time="2025-05-15T00:54:39.018738194Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:39.018996 env[1203]: time="2025-05-15T00:54:39.018846422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:39.018996 env[1203]: time="2025-05-15T00:54:39.018880518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:39.019189 env[1203]: time="2025-05-15T00:54:39.019153322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24 pid=4731 runtime=io.containerd.runc.v2 May 15 00:54:39.024000 audit[4711]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:39.024000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe26170280 a2=0 a3=0 items=0 ppid=2081 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:39.032315 systemd[1]: run-containerd-runc-k8s.io-73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24-runc.e8vuMw.mount: Deactivated successfully. May 15 00:54:39.033725 systemd[1]: Started cri-containerd-73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24.scope. May 15 00:54:39.038000 audit[4754]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4754 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:39.038000 audit[4754]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc3fa82e90 a2=0 a3=7ffc3fa82e7c items=0 ppid=2081 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:39.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.048000 audit: BPF prog-id=192 op=LOAD May 15 00:54:39.048000 audit[4754]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4754 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:39.048000 audit[4754]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc3fa82e90 a2=0 a3=7ffc3fa82e7c items=0 ppid=2081 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:39.049000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.049000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626165356362633834636566313039393364623765333036353331 May 15 00:54:39.049000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.049000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626165356362633834636566313039393364623765333036353331 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit: BPF prog-id=193 op=LOAD May 15 00:54:39.050000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000253bd0 items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626165356362633834636566313039393364623765333036353331 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit: BPF prog-id=194 op=LOAD May 15 00:54:39.050000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000253c18 items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626165356362633834636566313039393364623765333036353331 May 15 00:54:39.050000 audit: BPF prog-id=194 op=UNLOAD May 15 00:54:39.050000 audit: BPF prog-id=193 op=UNLOAD May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.050000 audit: BPF prog-id=195 op=LOAD May 15 00:54:39.050000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003b8028 items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626165356362633834636566313039393364623765333036353331 May 15 00:54:39.052235 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:54:39.054000 audit[4748]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4748 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:39.054000 audit[4748]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffcea237260 a2=0 a3=7ffcea23724c items=0 ppid=4115 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.054000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:39.069684 systemd-networkd[1026]: cali19988031607: Link UP May 15 00:54:39.072632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:54:39.072676 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali19988031607: link becomes ready May 15 00:54:39.072416 systemd-networkd[1026]: cali19988031607: Gained carrier May 15 00:54:39.079219 env[1203]: time="2025-05-15T00:54:39.079169375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b8f5d494-8w5fd,Uid:b6b6552b-76ab-48e5-ad1c-6f738c64971c,Namespace:calico-system,Attempt:1,} returns sandbox id \"73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24\"" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:38.938 [INFO][4670] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--vztvt-eth0 csi-node-driver- calico-system d89698cf-ee3e-4bee-bff3-be4ff5bd14cc 1132 0 2025-05-15 00:53:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-vztvt eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali19988031607 [] []}} ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:38.938 [INFO][4670] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:38.985 [INFO][4701] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" HandleID="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Workload="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.039 [INFO][4701] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" HandleID="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Workload="localhost-k8s-csi--node--driver--vztvt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003109e0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-vztvt", "timestamp":"2025-05-15 00:54:38.985353241 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.039 [INFO][4701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.039 [INFO][4701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.039 [INFO][4701] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.042 [INFO][4701] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.045 [INFO][4701] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.049 [INFO][4701] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.050 [INFO][4701] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.053 [INFO][4701] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.053 [INFO][4701] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.055 [INFO][4701] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.058 [INFO][4701] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.063 [INFO][4701] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.063 [INFO][4701] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" host="localhost" May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.063 [INFO][4701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:39.085629 env[1203]: 2025-05-15 00:54:39.063 [INFO][4701] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" HandleID="k8s-pod-network.75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Workload="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.086295 env[1203]: 2025-05-15 00:54:39.066 [INFO][4670] cni-plugin/k8s.go 386: Populated endpoint ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vztvt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc", ResourceVersion:"1132", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-vztvt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali19988031607", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:39.086295 env[1203]: 2025-05-15 00:54:39.066 [INFO][4670] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.086295 env[1203]: 2025-05-15 00:54:39.066 [INFO][4670] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali19988031607 ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.086295 env[1203]: 2025-05-15 00:54:39.072 [INFO][4670] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.086295 env[1203]: 2025-05-15 00:54:39.072 [INFO][4670] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vztvt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d89698cf-ee3e-4bee-bff3-be4ff5bd14cc", ResourceVersion:"1132", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c", Pod:"csi-node-driver-vztvt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali19988031607", MAC:"f2:15:1a:08:50:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:39.086295 env[1203]: 2025-05-15 00:54:39.081 [INFO][4670] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c" Namespace="calico-system" Pod="csi-node-driver-vztvt" WorkloadEndpoint="localhost-k8s-csi--node--driver--vztvt-eth0" May 15 00:54:39.091000 audit[4780]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:39.091000 audit[4780]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffe36e64c30 a2=0 a3=7ffe36e64c1c items=0 ppid=4115 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:39.101242 env[1203]: time="2025-05-15T00:54:39.101175316Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:39.101399 env[1203]: time="2025-05-15T00:54:39.101211506Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:39.101399 env[1203]: time="2025-05-15T00:54:39.101221545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:39.101399 env[1203]: time="2025-05-15T00:54:39.101342317Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c pid=4789 runtime=io.containerd.runc.v2 May 15 00:54:39.111993 systemd[1]: Started cri-containerd-75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c.scope. May 15 00:54:39.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.121000 audit: BPF prog-id=196 op=LOAD May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373630613433653938356662313733313434323861623030393736 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373630613433653938356662313733313434323861623030393736 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit: BPF prog-id=197 op=LOAD May 15 00:54:39.122000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a4ae0 items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373630613433653938356662313733313434323861623030393736 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit: BPF prog-id=198 op=LOAD May 15 00:54:39.122000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a4b28 items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373630613433653938356662313733313434323861623030393736 May 15 00:54:39.122000 audit: BPF prog-id=198 op=UNLOAD May 15 00:54:39.122000 audit: BPF prog-id=197 op=UNLOAD May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.122000 audit: BPF prog-id=199 op=LOAD May 15 00:54:39.122000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a4f38 items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373630613433653938356662313733313434323861623030393736 May 15 00:54:39.124129 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:54:39.131765 env[1203]: time="2025-05-15T00:54:39.131723049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vztvt,Uid:d89698cf-ee3e-4bee-bff3-be4ff5bd14cc,Namespace:calico-system,Attempt:1,} returns sandbox id \"75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c\"" May 15 00:54:39.581301 systemd-networkd[1026]: caliec8fe9ac01e: Gained IPv6LL May 15 00:54:39.691883 env[1203]: time="2025-05-15T00:54:39.691827720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:39.693525 env[1203]: time="2025-05-15T00:54:39.693478792Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:39.694900 env[1203]: time="2025-05-15T00:54:39.694861880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:39.696251 env[1203]: time="2025-05-15T00:54:39.696220651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:39.696646 env[1203]: time="2025-05-15T00:54:39.696602274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 00:54:39.697600 env[1203]: time="2025-05-15T00:54:39.697560765Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 00:54:39.698692 env[1203]: time="2025-05-15T00:54:39.698645410Z" level=info msg="CreateContainer within sandbox \"1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 00:54:39.709477 env[1203]: time="2025-05-15T00:54:39.709426384Z" level=info msg="CreateContainer within sandbox \"1e306a009aa42e17a958adc1c44fcc505f6b0e9c0c13106474f482272ec98f4e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ac0cf51a34c43b52df2121cf9009359c23f2896535e046b3d1573c6afe84ea3e\"" May 15 00:54:39.711292 env[1203]: time="2025-05-15T00:54:39.709892980Z" level=info msg="StartContainer for \"ac0cf51a34c43b52df2121cf9009359c23f2896535e046b3d1573c6afe84ea3e\"" May 15 00:54:39.724231 systemd[1]: Started cri-containerd-ac0cf51a34c43b52df2121cf9009359c23f2896535e046b3d1573c6afe84ea3e.scope. May 15 00:54:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.732000 audit: BPF prog-id=200 op=LOAD May 15 00:54:39.733000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4392 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306366353161333463343362353264663231323163663930303933 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4392 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306366353161333463343362353264663231323163663930303933 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.733000 audit: BPF prog-id=201 op=LOAD May 15 00:54:39.733000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a4020 items=0 ppid=4392 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306366353161333463343362353264663231323163663930303933 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit: BPF prog-id=202 op=LOAD May 15 00:54:39.734000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a4068 items=0 ppid=4392 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306366353161333463343362353264663231323163663930303933 May 15 00:54:39.734000 audit: BPF prog-id=202 op=UNLOAD May 15 00:54:39.734000 audit: BPF prog-id=201 op=UNLOAD May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:39.734000 audit: BPF prog-id=203 op=LOAD May 15 00:54:39.734000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4478 items=0 ppid=4392 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:39.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306366353161333463343362353264663231323163663930303933 May 15 00:54:39.765507 env[1203]: time="2025-05-15T00:54:39.765239170Z" level=info msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\"" May 15 00:54:39.766009 env[1203]: time="2025-05-15T00:54:39.765384950Z" level=info msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\"" May 15 00:54:39.799200 env[1203]: time="2025-05-15T00:54:39.799114707Z" level=info msg="StartContainer for \"ac0cf51a34c43b52df2121cf9009359c23f2896535e046b3d1573c6afe84ea3e\" returns successfully" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.822 [INFO][4894] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.822 [INFO][4894] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" iface="eth0" netns="/var/run/netns/cni-d545812b-8443-d6a3-5928-938e0c4bf610" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.823 [INFO][4894] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" iface="eth0" netns="/var/run/netns/cni-d545812b-8443-d6a3-5928-938e0c4bf610" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.823 [INFO][4894] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" iface="eth0" netns="/var/run/netns/cni-d545812b-8443-d6a3-5928-938e0c4bf610" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.823 [INFO][4894] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.823 [INFO][4894] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.845 [INFO][4910] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" HandleID="k8s-pod-network.d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" Workload="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.845 [INFO][4910] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.845 [INFO][4910] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.851 [WARNING][4910] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" HandleID="k8s-pod-network.d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" Workload="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.851 [INFO][4910] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" HandleID="k8s-pod-network.d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" Workload="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.852 [INFO][4910] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:39.856056 env[1203]: 2025-05-15 00:54:39.854 [INFO][4894] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3" May 15 00:54:39.856652 env[1203]: time="2025-05-15T00:54:39.856617329Z" level=info msg="TearDown network for sandbox \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\" successfully" May 15 00:54:39.856734 env[1203]: time="2025-05-15T00:54:39.856714216Z" level=info msg="StopPodSandbox for \"d59c688d4b93f02a660cf31c566c729a9a9539f88c91fc293af54b00856c0bc3\" returns successfully" May 15 00:54:39.857496 env[1203]: time="2025-05-15T00:54:39.857420192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-gw7kn,Uid:89e2d280-2615-4ec8-8862-59855f998485,Namespace:calico-apiserver,Attempt:1,}" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.838 [INFO][4893] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.838 [INFO][4893] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" iface="eth0" netns="/var/run/netns/cni-9cd7cdf9-8ea3-c8e3-a511-4ad68ba0e7db" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.838 [INFO][4893] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" iface="eth0" netns="/var/run/netns/cni-9cd7cdf9-8ea3-c8e3-a511-4ad68ba0e7db" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.838 [INFO][4893] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" iface="eth0" netns="/var/run/netns/cni-9cd7cdf9-8ea3-c8e3-a511-4ad68ba0e7db" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.838 [INFO][4893] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.838 [INFO][4893] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.862 [INFO][4917] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" HandleID="k8s-pod-network.73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" Workload="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.862 [INFO][4917] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.862 [INFO][4917] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.867 [WARNING][4917] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" HandleID="k8s-pod-network.73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" Workload="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.868 [INFO][4917] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" HandleID="k8s-pod-network.73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" Workload="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.869 [INFO][4917] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:39.872186 env[1203]: 2025-05-15 00:54:39.870 [INFO][4893] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd" May 15 00:54:39.872808 env[1203]: time="2025-05-15T00:54:39.872776487Z" level=info msg="TearDown network for sandbox \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\" successfully" May 15 00:54:39.872891 env[1203]: time="2025-05-15T00:54:39.872870689Z" level=info msg="StopPodSandbox for \"73f581577df9eb0e3e40018dc3fd89197f90fb5f66d80da10f0487301613eecd\" returns successfully" May 15 00:54:39.873251 kubelet[1936]: E0515 00:54:39.873220 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:39.874409 env[1203]: time="2025-05-15T00:54:39.874389897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tw99x,Uid:ca5d6b78-8a64-4987-912e-8674e449ef30,Namespace:kube-system,Attempt:1,}" May 15 00:54:39.954629 systemd[1]: run-netns-cni\x2dd545812b\x2d8443\x2dd6a3\x2d5928\x2d938e0c4bf610.mount: Deactivated successfully. May 15 00:54:39.954709 systemd[1]: run-netns-cni\x2d9cd7cdf9\x2d8ea3\x2dc8e3\x2da511\x2d4ad68ba0e7db.mount: Deactivated successfully. May 15 00:54:39.959086 kubelet[1936]: E0515 00:54:39.959057 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:40.203000 audit[4928]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:40.203000 audit[4928]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc72cdfc90 a2=0 a3=7ffc72cdfc7c items=0 ppid=2081 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:40.212000 audit[4928]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:40.212000 audit[4928]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc72cdfc90 a2=0 a3=7ffc72cdfc7c items=0 ppid=2081 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:40.397429 systemd-networkd[1026]: cali3d9956abc2f: Link UP May 15 00:54:40.400228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:54:40.400388 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3d9956abc2f: link becomes ready May 15 00:54:40.400582 systemd-networkd[1026]: cali3d9956abc2f: Gained carrier May 15 00:54:40.409462 kubelet[1936]: I0515 00:54:40.409009 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77c7f9db84-xznmm" podStartSLOduration=66.724400754 podStartE2EDuration="1m9.408986183s" podCreationTimestamp="2025-05-15 00:53:31 +0000 UTC" firstStartedPulling="2025-05-15 00:54:37.01277952 +0000 UTC m=+76.320601298" lastFinishedPulling="2025-05-15 00:54:39.697364949 +0000 UTC m=+79.005186727" observedRunningTime="2025-05-15 00:54:40.15813367 +0000 UTC m=+79.465955468" watchObservedRunningTime="2025-05-15 00:54:40.408986183 +0000 UTC m=+79.716807961" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.236 [INFO][4930] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0 calico-apiserver-77c7f9db84- calico-apiserver 89e2d280-2615-4ec8-8862-59855f998485 1160 0 2025-05-15 00:53:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77c7f9db84 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-77c7f9db84-gw7kn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3d9956abc2f [] []}} ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.236 [INFO][4930] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.267 [INFO][4958] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" HandleID="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Workload="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.277 [INFO][4958] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" HandleID="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Workload="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030ede0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-77c7f9db84-gw7kn", "timestamp":"2025-05-15 00:54:40.26752139 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.277 [INFO][4958] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.277 [INFO][4958] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.277 [INFO][4958] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.279 [INFO][4958] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.376 [INFO][4958] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.380 [INFO][4958] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.381 [INFO][4958] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.383 [INFO][4958] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.383 [INFO][4958] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.385 [INFO][4958] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8 May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.389 [INFO][4958] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.394 [INFO][4958] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.394 [INFO][4958] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" host="localhost" May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.394 [INFO][4958] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:40.412681 env[1203]: 2025-05-15 00:54:40.394 [INFO][4958] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" HandleID="k8s-pod-network.bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Workload="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.413446 env[1203]: 2025-05-15 00:54:40.395 [INFO][4930] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0", GenerateName:"calico-apiserver-77c7f9db84-", Namespace:"calico-apiserver", SelfLink:"", UID:"89e2d280-2615-4ec8-8862-59855f998485", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77c7f9db84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-77c7f9db84-gw7kn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3d9956abc2f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:40.413446 env[1203]: 2025-05-15 00:54:40.395 [INFO][4930] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.413446 env[1203]: 2025-05-15 00:54:40.395 [INFO][4930] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3d9956abc2f ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.413446 env[1203]: 2025-05-15 00:54:40.401 [INFO][4930] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.413446 env[1203]: 2025-05-15 00:54:40.401 [INFO][4930] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0", GenerateName:"calico-apiserver-77c7f9db84-", Namespace:"calico-apiserver", SelfLink:"", UID:"89e2d280-2615-4ec8-8862-59855f998485", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77c7f9db84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8", Pod:"calico-apiserver-77c7f9db84-gw7kn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3d9956abc2f", MAC:"fe:57:6e:33:36:41", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:40.413446 env[1203]: 2025-05-15 00:54:40.408 [INFO][4930] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8" Namespace="calico-apiserver" Pod="calico-apiserver-77c7f9db84-gw7kn" WorkloadEndpoint="localhost-k8s-calico--apiserver--77c7f9db84--gw7kn-eth0" May 15 00:54:40.423000 audit[4986]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:40.423000 audit[4986]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7fff845c01d0 a2=0 a3=7fff845c01bc items=0 ppid=4115 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.423000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:40.495381 env[1203]: time="2025-05-15T00:54:40.495257125Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:40.495562 env[1203]: time="2025-05-15T00:54:40.495298395Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:40.495562 env[1203]: time="2025-05-15T00:54:40.495311520Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:40.495679 env[1203]: time="2025-05-15T00:54:40.495546221Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8 pid=4995 runtime=io.containerd.runc.v2 May 15 00:54:40.511634 systemd[1]: Started cri-containerd-bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8.scope. May 15 00:54:40.515147 systemd-networkd[1026]: cali55b9dbcf517: Link UP May 15 00:54:40.516436 systemd-networkd[1026]: cali55b9dbcf517: Gained carrier May 15 00:54:40.516948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali55b9dbcf517: link becomes ready May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.255 [INFO][4942] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--tw99x-eth0 coredns-6f6b679f8f- kube-system ca5d6b78-8a64-4987-912e-8674e449ef30 1161 0 2025-05-15 00:53:25 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-tw99x eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali55b9dbcf517 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.255 [INFO][4942] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.290 [INFO][4966] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" HandleID="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Workload="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.378 [INFO][4966] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" HandleID="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Workload="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051100), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-tw99x", "timestamp":"2025-05-15 00:54:40.290086157 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.378 [INFO][4966] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.395 [INFO][4966] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.395 [INFO][4966] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.402 [INFO][4966] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.488 [INFO][4966] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.494 [INFO][4966] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.496 [INFO][4966] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.498 [INFO][4966] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.498 [INFO][4966] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.499 [INFO][4966] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.503 [INFO][4966] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.510 [INFO][4966] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.510 [INFO][4966] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" host="localhost" May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.510 [INFO][4966] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:54:40.529938 env[1203]: 2025-05-15 00:54:40.510 [INFO][4966] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" HandleID="k8s-pod-network.f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Workload="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.530510 env[1203]: 2025-05-15 00:54:40.513 [INFO][4942] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tw99x-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ca5d6b78-8a64-4987-912e-8674e449ef30", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-tw99x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali55b9dbcf517", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:40.530510 env[1203]: 2025-05-15 00:54:40.514 [INFO][4942] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.530510 env[1203]: 2025-05-15 00:54:40.514 [INFO][4942] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali55b9dbcf517 ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.530510 env[1203]: 2025-05-15 00:54:40.516 [INFO][4942] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.530510 env[1203]: 2025-05-15 00:54:40.516 [INFO][4942] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tw99x-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ca5d6b78-8a64-4987-912e-8674e449ef30", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 53, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a", Pod:"coredns-6f6b679f8f-tw99x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali55b9dbcf517", MAC:"fa:60:7f:8c:c5:e9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:54:40.530510 env[1203]: 2025-05-15 00:54:40.526 [INFO][4942] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a" Namespace="kube-system" Pod="coredns-6f6b679f8f-tw99x" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tw99x-eth0" May 15 00:54:40.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.530000 audit: BPF prog-id=204 op=LOAD May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4995 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393961666636373832373630343339366465343865616137373031 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4995 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393961666636373832373630343339366465343865616137373031 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit: BPF prog-id=205 op=LOAD May 15 00:54:40.531000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097b90 items=0 ppid=4995 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393961666636373832373630343339366465343865616137373031 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit: BPF prog-id=206 op=LOAD May 15 00:54:40.531000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097bd8 items=0 ppid=4995 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393961666636373832373630343339366465343865616137373031 May 15 00:54:40.531000 audit: BPF prog-id=206 op=UNLOAD May 15 00:54:40.531000 audit: BPF prog-id=205 op=UNLOAD May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.531000 audit: BPF prog-id=207 op=LOAD May 15 00:54:40.531000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000097fe8 items=0 ppid=4995 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393961666636373832373630343339366465343865616137373031 May 15 00:54:40.533858 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:54:40.547000 audit[5042]: NETFILTER_CFG table=filter:112 family=2 entries=46 op=nft_register_chain pid=5042 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:54:40.549440 env[1203]: time="2025-05-15T00:54:40.548459162Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:54:40.549440 env[1203]: time="2025-05-15T00:54:40.548829082Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:54:40.549440 env[1203]: time="2025-05-15T00:54:40.548843870Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:54:40.549440 env[1203]: time="2025-05-15T00:54:40.548987566Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a pid=5045 runtime=io.containerd.runc.v2 May 15 00:54:40.547000 audit[5042]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7ffe0af01110 a2=0 a3=7ffe0af010fc items=0 ppid=4115 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:54:40.555630 env[1203]: time="2025-05-15T00:54:40.555587529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77c7f9db84-gw7kn,Uid:89e2d280-2615-4ec8-8862-59855f998485,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8\"" May 15 00:54:40.557778 env[1203]: time="2025-05-15T00:54:40.557756613Z" level=info msg="CreateContainer within sandbox \"bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 00:54:40.565576 systemd[1]: Started cri-containerd-f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a.scope. May 15 00:54:40.573484 env[1203]: time="2025-05-15T00:54:40.573442944Z" level=info msg="CreateContainer within sandbox \"bc99aff67827604396de48eaa7701060b1f8c56fefe8c9fc46125675a11abef8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"070abf59b7022e315089017869cee4be8635cedf161ec6117ab0a36f2c8a7762\"" May 15 00:54:40.574189 env[1203]: time="2025-05-15T00:54:40.574171402Z" level=info msg="StartContainer for \"070abf59b7022e315089017869cee4be8635cedf161ec6117ab0a36f2c8a7762\"" May 15 00:54:40.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit: BPF prog-id=208 op=LOAD May 15 00:54:40.577000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.577000 audit[5060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5045 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396261653439306532626637643564356563316232636635313964 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5045 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396261653439306532626637643564356563316232636635313964 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.578000 audit: BPF prog-id=209 op=LOAD May 15 00:54:40.578000 audit[5060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000224920 items=0 ppid=5045 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396261653439306532626637643564356563316232636635313964 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.579000 audit: BPF prog-id=210 op=LOAD May 15 00:54:40.579000 audit[5060]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000224968 items=0 ppid=5045 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396261653439306532626637643564356563316232636635313964 May 15 00:54:40.579000 audit: BPF prog-id=210 op=UNLOAD May 15 00:54:40.579000 audit: BPF prog-id=209 op=UNLOAD May 15 00:54:40.580000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { perfmon } for pid=5060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit[5060]: AVC avc: denied { bpf } for pid=5060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.580000 audit: BPF prog-id=211 op=LOAD May 15 00:54:40.580000 audit[5060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000224d78 items=0 ppid=5045 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396261653439306532626637643564356563316232636635313964 May 15 00:54:40.582506 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:54:40.591000 audit[4841]: AVC avc: denied { watch } for pid=4841 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_00_53_47.3214595713/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c187,c196 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c187,c196 tclass=file permissive=0 May 15 00:54:40.591000 audit[4841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000df2320 a2=fc6 a3=0 items=0 ppid=4392 pid=4841 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c187,c196 key=(null) May 15 00:54:40.591000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 00:54:40.594589 systemd[1]: Started cri-containerd-070abf59b7022e315089017869cee4be8635cedf161ec6117ab0a36f2c8a7762.scope. May 15 00:54:40.609810 env[1203]: time="2025-05-15T00:54:40.609772402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tw99x,Uid:ca5d6b78-8a64-4987-912e-8674e449ef30,Namespace:kube-system,Attempt:1,} returns sandbox id \"f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a\"" May 15 00:54:40.610329 kubelet[1936]: E0515 00:54:40.610305 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:40.612192 env[1203]: time="2025-05-15T00:54:40.612166930Z" level=info msg="CreateContainer within sandbox \"f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 00:54:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.620000 audit: BPF prog-id=212 op=LOAD May 15 00:54:40.623000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4995 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306162663539623730323265333135303839303137383639636565 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4995 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306162663539623730323265333135303839303137383639636565 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.623000 audit: BPF prog-id=213 op=LOAD May 15 00:54:40.623000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000397a00 items=0 ppid=4995 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306162663539623730323265333135303839303137383639636565 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit: BPF prog-id=214 op=LOAD May 15 00:54:40.628000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000397a48 items=0 ppid=4995 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306162663539623730323265333135303839303137383639636565 May 15 00:54:40.628000 audit: BPF prog-id=214 op=UNLOAD May 15 00:54:40.628000 audit: BPF prog-id=213 op=UNLOAD May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.628000 audit: BPF prog-id=215 op=LOAD May 15 00:54:40.628000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000397e58 items=0 ppid=4995 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306162663539623730323265333135303839303137383639636565 May 15 00:54:40.634062 env[1203]: time="2025-05-15T00:54:40.634015692Z" level=info msg="CreateContainer within sandbox \"f29bae490e2bf7d5d5ec1b2cf519d87529d3aa1ea4640bdcaee1e3cbefa14d6a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ed47906b757ec7c165d9bd7c1272b10f9f7b49eadd931cd644a3315f60a9b065\"" May 15 00:54:40.634686 env[1203]: time="2025-05-15T00:54:40.634660430Z" level=info msg="StartContainer for \"ed47906b757ec7c165d9bd7c1272b10f9f7b49eadd931cd644a3315f60a9b065\"" May 15 00:54:40.647607 systemd[1]: Started cri-containerd-ed47906b757ec7c165d9bd7c1272b10f9f7b49eadd931cd644a3315f60a9b065.scope. May 15 00:54:40.660383 env[1203]: time="2025-05-15T00:54:40.660339107Z" level=info msg="StartContainer for \"070abf59b7022e315089017869cee4be8635cedf161ec6117ab0a36f2c8a7762\" returns successfully" May 15 00:54:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit: BPF prog-id=216 op=LOAD May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5045 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343739303662373537656337633136356439626437633132373262 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5045 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343739303662373537656337633136356439626437633132373262 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit: BPF prog-id=217 op=LOAD May 15 00:54:40.661000 audit[5117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000312430 items=0 ppid=5045 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343739303662373537656337633136356439626437633132373262 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit: BPF prog-id=218 op=LOAD May 15 00:54:40.661000 audit[5117]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000312478 items=0 ppid=5045 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343739303662373537656337633136356439626437633132373262 May 15 00:54:40.661000 audit: BPF prog-id=218 op=UNLOAD May 15 00:54:40.661000 audit: BPF prog-id=217 op=UNLOAD May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { perfmon } for pid=5117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit[5117]: AVC avc: denied { bpf } for pid=5117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:40.661000 audit: BPF prog-id=219 op=LOAD May 15 00:54:40.661000 audit[5117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000312888 items=0 ppid=5045 pid=5117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343739303662373537656337633136356439626437633132373262 May 15 00:54:40.669051 systemd-networkd[1026]: cali97a6bfbb9ea: Gained IPv6LL May 15 00:54:40.705187 env[1203]: time="2025-05-15T00:54:40.705135563Z" level=info msg="StartContainer for \"ed47906b757ec7c165d9bd7c1272b10f9f7b49eadd931cd644a3315f60a9b065\" returns successfully" May 15 00:54:40.797066 systemd-networkd[1026]: cali19988031607: Gained IPv6LL May 15 00:54:40.962936 kubelet[1936]: E0515 00:54:40.962898 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:40.965641 kubelet[1936]: E0515 00:54:40.965599 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:40.984330 kubelet[1936]: I0515 00:54:40.984261 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-tw99x" podStartSLOduration=75.984241567 podStartE2EDuration="1m15.984241567s" podCreationTimestamp="2025-05-15 00:53:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:54:40.975289348 +0000 UTC m=+80.283111126" watchObservedRunningTime="2025-05-15 00:54:40.984241567 +0000 UTC m=+80.292063345" May 15 00:54:40.990000 audit[5170]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=5170 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:40.990000 audit[5170]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe6744bec0 a2=0 a3=7ffe6744beac items=0 ppid=2081 pid=5170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:40.997000 audit[5170]: NETFILTER_CFG table=nat:114 family=2 entries=51 op=nft_register_chain pid=5170 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:40.997000 audit[5170]: SYSCALL arch=c000003e syscall=46 success=yes exit=17772 a0=3 a1=7ffe6744bec0 a2=0 a3=7ffe6744beac items=0 ppid=2081 pid=5170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:40.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:41.327000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_00_53_47.536300883/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c788 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c34,c788 tclass=file permissive=0 May 15 00:54:41.327000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000467400 a2=fc6 a3=0 items=0 ppid=4995 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c788 key=(null) May 15 00:54:41.327000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 00:54:41.367614 kubelet[1936]: I0515 00:54:41.367556 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77c7f9db84-gw7kn" podStartSLOduration=70.367539405 podStartE2EDuration="1m10.367539405s" podCreationTimestamp="2025-05-15 00:53:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:54:41.008015327 +0000 UTC m=+80.315837095" watchObservedRunningTime="2025-05-15 00:54:41.367539405 +0000 UTC m=+80.675361183" May 15 00:54:41.764226 kubelet[1936]: E0515 00:54:41.764182 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:41.967287 kubelet[1936]: E0515 00:54:41.966983 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:42.009000 audit[5173]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=5173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:42.009000 audit[5173]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd3509ba0 a2=0 a3=7fffd3509b8c items=0 ppid=2081 pid=5173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:42.013098 systemd-networkd[1026]: cali3d9956abc2f: Gained IPv6LL May 15 00:54:42.031000 audit[5173]: NETFILTER_CFG table=nat:116 family=2 entries=70 op=nft_register_chain pid=5173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:42.031000 audit[5173]: SYSCALL arch=c000003e syscall=46 success=yes exit=25324 a0=3 a1=7fffd3509ba0 a2=0 a3=7fffd3509b8c items=0 ppid=2081 pid=5173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:42.077149 systemd-networkd[1026]: cali55b9dbcf517: Gained IPv6LL May 15 00:54:42.328524 env[1203]: time="2025-05-15T00:54:42.328393905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:42.330840 env[1203]: time="2025-05-15T00:54:42.330804488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:42.332751 env[1203]: time="2025-05-15T00:54:42.332729600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:42.334293 env[1203]: time="2025-05-15T00:54:42.334256228Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:42.334831 env[1203]: time="2025-05-15T00:54:42.334787126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 00:54:42.336096 env[1203]: time="2025-05-15T00:54:42.335825087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 00:54:42.343216 env[1203]: time="2025-05-15T00:54:42.343171857Z" level=info msg="CreateContainer within sandbox \"73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 00:54:42.356510 env[1203]: time="2025-05-15T00:54:42.356465361Z" level=info msg="CreateContainer within sandbox \"73bae5cbc84cef10993db7e306531013867ff1c6525fcd69c1a80cf24e78bd24\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"423ab4205f26c4bea8b5b89a848c15823b1d6b7777ce50aaddd0c79c30274f3b\"" May 15 00:54:42.357038 env[1203]: time="2025-05-15T00:54:42.357007000Z" level=info msg="StartContainer for \"423ab4205f26c4bea8b5b89a848c15823b1d6b7777ce50aaddd0c79c30274f3b\"" May 15 00:54:42.373782 systemd[1]: Started cri-containerd-423ab4205f26c4bea8b5b89a848c15823b1d6b7777ce50aaddd0c79c30274f3b.scope. May 15 00:54:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit: BPF prog-id=220 op=LOAD May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4731 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336162343230356632366334626561386235623839613834386331 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4731 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336162343230356632366334626561386235623839613834386331 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit: BPF prog-id=221 op=LOAD May 15 00:54:42.384000 audit[5184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000247b0 items=0 ppid=4731 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336162343230356632366334626561386235623839613834386331 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit: BPF prog-id=222 op=LOAD May 15 00:54:42.384000 audit[5184]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000247f8 items=0 ppid=4731 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336162343230356632366334626561386235623839613834386331 May 15 00:54:42.384000 audit: BPF prog-id=222 op=UNLOAD May 15 00:54:42.384000 audit: BPF prog-id=221 op=UNLOAD May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { perfmon } for pid=5184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit[5184]: AVC avc: denied { bpf } for pid=5184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:42.384000 audit: BPF prog-id=223 op=LOAD May 15 00:54:42.384000 audit[5184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024c08 items=0 ppid=4731 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336162343230356632366334626561386235623839613834386331 May 15 00:54:42.408868 env[1203]: time="2025-05-15T00:54:42.408811042Z" level=info msg="StartContainer for \"423ab4205f26c4bea8b5b89a848c15823b1d6b7777ce50aaddd0c79c30274f3b\" returns successfully" May 15 00:54:42.899088 systemd[1]: Started sshd@20-10.0.0.92:22-10.0.0.1:43378.service. May 15 00:54:42.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.92:22-10.0.0.1:43378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:42.900393 kernel: kauditd_printk_skb: 622 callbacks suppressed May 15 00:54:42.900452 kernel: audit: type=1130 audit(1747270482.898:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.92:22-10.0.0.1:43378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:42.933000 audit[5214]: USER_ACCT pid=5214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.934575 sshd[5214]: Accepted publickey for core from 10.0.0.1 port 43378 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:42.938000 audit[5214]: CRED_ACQ pid=5214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.939775 sshd[5214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:42.943193 systemd-logind[1193]: New session 21 of user core. May 15 00:54:42.945941 kernel: audit: type=1101 audit(1747270482.933:1520): pid=5214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.946007 kernel: audit: type=1103 audit(1747270482.938:1521): pid=5214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.946033 kernel: audit: type=1006 audit(1747270482.938:1522): pid=5214 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 15 00:54:42.944002 systemd[1]: Started session-21.scope. May 15 00:54:42.947743 kernel: audit: type=1300 audit(1747270482.938:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd26b126e0 a2=3 a3=0 items=0 ppid=1 pid=5214 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.938000 audit[5214]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd26b126e0 a2=3 a3=0 items=0 ppid=1 pid=5214 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:42.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:42.953437 kernel: audit: type=1327 audit(1747270482.938:1522): proctitle=737368643A20636F7265205B707269765D May 15 00:54:42.953477 kernel: audit: type=1105 audit(1747270482.947:1523): pid=5214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.947000 audit[5214]: USER_START pid=5214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.957625 kernel: audit: type=1103 audit(1747270482.948:1524): pid=5216 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.948000 audit[5216]: CRED_ACQ pid=5216 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:42.970334 kubelet[1936]: E0515 00:54:42.970220 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:42.978941 kubelet[1936]: I0515 00:54:42.978876 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55b8f5d494-8w5fd" podStartSLOduration=67.726479352 podStartE2EDuration="1m10.978861745s" podCreationTimestamp="2025-05-15 00:53:32 +0000 UTC" firstStartedPulling="2025-05-15 00:54:39.083223674 +0000 UTC m=+78.391045452" lastFinishedPulling="2025-05-15 00:54:42.335606067 +0000 UTC m=+81.643427845" observedRunningTime="2025-05-15 00:54:42.978044236 +0000 UTC m=+82.285866015" watchObservedRunningTime="2025-05-15 00:54:42.978861745 +0000 UTC m=+82.286683523" May 15 00:54:43.100236 sshd[5214]: pam_unix(sshd:session): session closed for user core May 15 00:54:43.100000 audit[5214]: USER_END pid=5214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:43.102348 systemd[1]: sshd@20-10.0.0.92:22-10.0.0.1:43378.service: Deactivated successfully. May 15 00:54:43.103005 systemd[1]: session-21.scope: Deactivated successfully. May 15 00:54:43.103738 systemd-logind[1193]: Session 21 logged out. Waiting for processes to exit. May 15 00:54:43.104438 systemd-logind[1193]: Removed session 21. May 15 00:54:43.100000 audit[5214]: CRED_DISP pid=5214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:43.109640 kernel: audit: type=1106 audit(1747270483.100:1525): pid=5214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:43.109703 kernel: audit: type=1104 audit(1747270483.100:1526): pid=5214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:43.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.92:22-10.0.0.1:43378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:43.764905 kubelet[1936]: E0515 00:54:43.764856 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:44.346673 env[1203]: time="2025-05-15T00:54:44.346618225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:44.348582 env[1203]: time="2025-05-15T00:54:44.348549304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:44.350070 env[1203]: time="2025-05-15T00:54:44.350032525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:44.351664 env[1203]: time="2025-05-15T00:54:44.351635095Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:44.352145 env[1203]: time="2025-05-15T00:54:44.352112831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 00:54:44.355398 env[1203]: time="2025-05-15T00:54:44.355348409Z" level=info msg="CreateContainer within sandbox \"75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 00:54:44.375274 env[1203]: time="2025-05-15T00:54:44.375215407Z" level=info msg="CreateContainer within sandbox \"75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"057e3ca2f491b89890a747f0a432a6e1810cbe3d33f1d50a5d3176ebeaa5c443\"" May 15 00:54:44.375781 env[1203]: time="2025-05-15T00:54:44.375742367Z" level=info msg="StartContainer for \"057e3ca2f491b89890a747f0a432a6e1810cbe3d33f1d50a5d3176ebeaa5c443\"" May 15 00:54:44.395385 systemd[1]: Started cri-containerd-057e3ca2f491b89890a747f0a432a6e1810cbe3d33f1d50a5d3176ebeaa5c443.scope. May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fef00724de8 items=0 ppid=4789 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:44.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376533636132663439316238393839306137343766306134333261 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit: BPF prog-id=224 op=LOAD May 15 00:54:44.405000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030ff68 items=0 ppid=4789 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:44.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376533636132663439316238393839306137343766306134333261 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit: BPF prog-id=225 op=LOAD May 15 00:54:44.405000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030ffb8 items=0 ppid=4789 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:44.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376533636132663439316238393839306137343766306134333261 May 15 00:54:44.405000 audit: BPF prog-id=225 op=UNLOAD May 15 00:54:44.405000 audit: BPF prog-id=224 op=UNLOAD May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:44.405000 audit: BPF prog-id=226 op=LOAD May 15 00:54:44.405000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000362048 items=0 ppid=4789 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:44.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376533636132663439316238393839306137343766306134333261 May 15 00:54:44.420870 env[1203]: time="2025-05-15T00:54:44.420825471Z" level=info msg="StartContainer for \"057e3ca2f491b89890a747f0a432a6e1810cbe3d33f1d50a5d3176ebeaa5c443\" returns successfully" May 15 00:54:44.422338 env[1203]: time="2025-05-15T00:54:44.422299876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 00:54:46.048905 env[1203]: time="2025-05-15T00:54:46.048852106Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:46.050937 env[1203]: time="2025-05-15T00:54:46.050892279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:46.052442 env[1203]: time="2025-05-15T00:54:46.052409904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:46.053977 env[1203]: time="2025-05-15T00:54:46.053953328Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:54:46.054386 env[1203]: time="2025-05-15T00:54:46.054360426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 00:54:46.055935 env[1203]: time="2025-05-15T00:54:46.055895274Z" level=info msg="CreateContainer within sandbox \"75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 00:54:46.068460 env[1203]: time="2025-05-15T00:54:46.068424941Z" level=info msg="CreateContainer within sandbox \"75760a43e985fb17314428ab009761761c7b94beb2ffcf27ce7ffb889f77166c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b6ef489ccddb0bd56b3998018999c9c88c8d932eecf6776e636965bbd8c767c1\"" May 15 00:54:46.068856 env[1203]: time="2025-05-15T00:54:46.068833032Z" level=info msg="StartContainer for \"b6ef489ccddb0bd56b3998018999c9c88c8d932eecf6776e636965bbd8c767c1\"" May 15 00:54:46.087244 systemd[1]: Started cri-containerd-b6ef489ccddb0bd56b3998018999c9c88c8d932eecf6776e636965bbd8c767c1.scope. May 15 00:54:46.098000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fcd208bb688 items=0 ppid=4789 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:46.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656634383963636464623062643536623339393830313839393963 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.098000 audit: BPF prog-id=227 op=LOAD May 15 00:54:46.098000 audit[5299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000237eb8 items=0 ppid=4789 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:46.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656634383963636464623062643536623339393830313839393963 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit: BPF prog-id=228 op=LOAD May 15 00:54:46.099000 audit[5299]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000237f08 items=0 ppid=4789 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:46.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656634383963636464623062643536623339393830313839393963 May 15 00:54:46.099000 audit: BPF prog-id=228 op=UNLOAD May 15 00:54:46.099000 audit: BPF prog-id=227 op=UNLOAD May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:54:46.099000 audit: BPF prog-id=229 op=LOAD May 15 00:54:46.099000 audit[5299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000237f98 items=0 ppid=4789 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:46.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236656634383963636464623062643536623339393830313839393963 May 15 00:54:46.112793 env[1203]: time="2025-05-15T00:54:46.112731768Z" level=info msg="StartContainer for \"b6ef489ccddb0bd56b3998018999c9c88c8d932eecf6776e636965bbd8c767c1\" returns successfully" May 15 00:54:46.844362 kubelet[1936]: I0515 00:54:46.844169 1936 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 00:54:46.844362 kubelet[1936]: I0515 00:54:46.844208 1936 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 00:54:46.996087 kubelet[1936]: I0515 00:54:46.996008 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vztvt" podStartSLOduration=68.073784214 podStartE2EDuration="1m14.995989688s" podCreationTimestamp="2025-05-15 00:53:32 +0000 UTC" firstStartedPulling="2025-05-15 00:54:39.132702611 +0000 UTC m=+78.440524389" lastFinishedPulling="2025-05-15 00:54:46.054908085 +0000 UTC m=+85.362729863" observedRunningTime="2025-05-15 00:54:46.995989998 +0000 UTC m=+86.303811806" watchObservedRunningTime="2025-05-15 00:54:46.995989688 +0000 UTC m=+86.303811466" May 15 00:54:47.064893 systemd[1]: run-containerd-runc-k8s.io-b6ef489ccddb0bd56b3998018999c9c88c8d932eecf6776e636965bbd8c767c1-runc.Bmw6P5.mount: Deactivated successfully. May 15 00:54:47.764591 kubelet[1936]: E0515 00:54:47.764546 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:54:48.103792 systemd[1]: Started sshd@21-10.0.0.92:22-10.0.0.1:42224.service. May 15 00:54:48.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.92:22-10.0.0.1:42224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:48.105114 kernel: kauditd_printk_skb: 87 callbacks suppressed May 15 00:54:48.105223 kernel: audit: type=1130 audit(1747270488.102:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.92:22-10.0.0.1:42224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:48.134000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.135567 sshd[5331]: Accepted publickey for core from 10.0.0.1 port 42224 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:48.137932 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:48.136000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.141249 systemd-logind[1193]: New session 22 of user core. May 15 00:54:48.142023 systemd[1]: Started session-22.scope. May 15 00:54:48.142969 kernel: audit: type=1101 audit(1747270488.134:1541): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.143025 kernel: audit: type=1103 audit(1747270488.136:1542): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.143050 kernel: audit: type=1006 audit(1747270488.136:1543): pid=5331 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 00:54:48.136000 audit[5331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff12ef0570 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:48.149221 kernel: audit: type=1300 audit(1747270488.136:1543): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff12ef0570 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:48.149441 kernel: audit: type=1327 audit(1747270488.136:1543): proctitle=737368643A20636F7265205B707269765D May 15 00:54:48.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:48.150532 kernel: audit: type=1105 audit(1747270488.144:1544): pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.144000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.154700 kernel: audit: type=1103 audit(1747270488.146:1545): pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.146000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.263200 sshd[5331]: pam_unix(sshd:session): session closed for user core May 15 00:54:48.263000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.265555 systemd[1]: sshd@21-10.0.0.92:22-10.0.0.1:42224.service: Deactivated successfully. May 15 00:54:48.266275 systemd[1]: session-22.scope: Deactivated successfully. May 15 00:54:48.266984 systemd-logind[1193]: Session 22 logged out. Waiting for processes to exit. May 15 00:54:48.267807 systemd-logind[1193]: Removed session 22. May 15 00:54:48.263000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.271942 kernel: audit: type=1106 audit(1747270488.263:1546): pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.272005 kernel: audit: type=1104 audit(1747270488.263:1547): pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:48.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.92:22-10.0.0.1:42224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.267513 systemd[1]: Started sshd@22-10.0.0.92:22-10.0.0.1:42236.service. May 15 00:54:53.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.92:22-10.0.0.1:42236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.268685 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:54:53.268825 kernel: audit: type=1130 audit(1747270493.265:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.92:22-10.0.0.1:42236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.296000 audit[5349]: USER_ACCT pid=5349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.298114 sshd[5349]: Accepted publickey for core from 10.0.0.1 port 42236 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:53.306559 kernel: audit: type=1101 audit(1747270493.296:1550): pid=5349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.306621 kernel: audit: type=1103 audit(1747270493.301:1551): pid=5349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.301000 audit[5349]: CRED_ACQ pid=5349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.305601 systemd-logind[1193]: New session 23 of user core. May 15 00:54:53.302640 sshd[5349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:53.306298 systemd[1]: Started session-23.scope. May 15 00:54:53.301000 audit[5349]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff983cc340 a2=3 a3=0 items=0 ppid=1 pid=5349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:53.316241 kernel: audit: type=1006 audit(1747270493.301:1552): pid=5349 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 00:54:53.316285 kernel: audit: type=1300 audit(1747270493.301:1552): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff983cc340 a2=3 a3=0 items=0 ppid=1 pid=5349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:53.316308 kernel: audit: type=1327 audit(1747270493.301:1552): proctitle=737368643A20636F7265205B707269765D May 15 00:54:53.301000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:53.309000 audit[5349]: USER_START pid=5349 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.322421 kernel: audit: type=1105 audit(1747270493.309:1553): pid=5349 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.322462 kernel: audit: type=1103 audit(1747270493.310:1554): pid=5351 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.310000 audit[5351]: CRED_ACQ pid=5351 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.411171 sshd[5349]: pam_unix(sshd:session): session closed for user core May 15 00:54:53.411000 audit[5349]: USER_END pid=5349 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.411000 audit[5349]: CRED_DISP pid=5349 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.414068 systemd[1]: sshd@22-10.0.0.92:22-10.0.0.1:42236.service: Deactivated successfully. May 15 00:54:53.414547 systemd[1]: session-23.scope: Deactivated successfully. May 15 00:54:53.415176 systemd-logind[1193]: Session 23 logged out. Waiting for processes to exit. May 15 00:54:53.416153 systemd[1]: Started sshd@23-10.0.0.92:22-10.0.0.1:42242.service. May 15 00:54:53.416832 systemd-logind[1193]: Removed session 23. May 15 00:54:53.419909 kernel: audit: type=1106 audit(1747270493.411:1555): pid=5349 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.419970 kernel: audit: type=1104 audit(1747270493.411:1556): pid=5349 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.92:22-10.0.0.1:42236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.92:22-10.0.0.1:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.443000 audit[5362]: USER_ACCT pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.444132 sshd[5362]: Accepted publickey for core from 10.0.0.1 port 42242 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:53.443000 audit[5362]: CRED_ACQ pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.443000 audit[5362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8ef1c070 a2=3 a3=0 items=0 ppid=1 pid=5362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:53.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:53.445066 sshd[5362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:53.448026 systemd-logind[1193]: New session 24 of user core. May 15 00:54:53.448716 systemd[1]: Started session-24.scope. May 15 00:54:53.451000 audit[5362]: USER_START pid=5362 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.452000 audit[5364]: CRED_ACQ pid=5364 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.714581 sshd[5362]: pam_unix(sshd:session): session closed for user core May 15 00:54:53.714000 audit[5362]: USER_END pid=5362 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.714000 audit[5362]: CRED_DISP pid=5362 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.717773 systemd[1]: sshd@23-10.0.0.92:22-10.0.0.1:42242.service: Deactivated successfully. May 15 00:54:53.718421 systemd[1]: session-24.scope: Deactivated successfully. May 15 00:54:53.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.92:22-10.0.0.1:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.718987 systemd-logind[1193]: Session 24 logged out. Waiting for processes to exit. May 15 00:54:53.720038 systemd[1]: Started sshd@24-10.0.0.92:22-10.0.0.1:42256.service. May 15 00:54:53.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.92:22-10.0.0.1:42256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:53.721105 systemd-logind[1193]: Removed session 24. May 15 00:54:53.750000 audit[5373]: USER_ACCT pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.751645 sshd[5373]: Accepted publickey for core from 10.0.0.1 port 42256 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:53.751000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.751000 audit[5373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8097f430 a2=3 a3=0 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:53.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:53.752936 sshd[5373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:53.756266 systemd-logind[1193]: New session 25 of user core. May 15 00:54:53.757059 systemd[1]: Started session-25.scope. May 15 00:54:53.760000 audit[5373]: USER_START pid=5373 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:53.761000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.259000 audit[5386]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:55.259000 audit[5386]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff90390820 a2=0 a3=7fff9039080c items=0 ppid=2081 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:55.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:55.262683 sshd[5373]: pam_unix(sshd:session): session closed for user core May 15 00:54:55.262000 audit[5373]: USER_END pid=5373 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.262000 audit[5373]: CRED_DISP pid=5373 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.265743 systemd[1]: Started sshd@25-10.0.0.92:22-10.0.0.1:42268.service. May 15 00:54:55.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.92:22-10.0.0.1:42268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:55.266229 systemd[1]: sshd@24-10.0.0.92:22-10.0.0.1:42256.service: Deactivated successfully. May 15 00:54:55.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.92:22-10.0.0.1:42256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:55.266991 systemd[1]: session-25.scope: Deactivated successfully. May 15 00:54:55.267873 systemd-logind[1193]: Session 25 logged out. Waiting for processes to exit. May 15 00:54:55.268696 systemd-logind[1193]: Removed session 25. May 15 00:54:55.269000 audit[5386]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:55.269000 audit[5386]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff90390820 a2=0 a3=0 items=0 ppid=2081 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:55.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:55.282000 audit[5392]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=5392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:55.282000 audit[5392]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffee14baa80 a2=0 a3=7ffee14baa6c items=0 ppid=2081 pid=5392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:55.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:55.288000 audit[5392]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:54:55.288000 audit[5392]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee14baa80 a2=0 a3=0 items=0 ppid=2081 pid=5392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:55.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:54:55.296000 audit[5388]: USER_ACCT pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.297221 sshd[5388]: Accepted publickey for core from 10.0.0.1 port 42268 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:55.296000 audit[5388]: CRED_ACQ pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.297000 audit[5388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4deaf850 a2=3 a3=0 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:55.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:55.298189 sshd[5388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:55.301536 systemd-logind[1193]: New session 26 of user core. May 15 00:54:55.302227 systemd[1]: Started session-26.scope. May 15 00:54:55.305000 audit[5388]: USER_START pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.306000 audit[5393]: CRED_ACQ pid=5393 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.800542 sshd[5388]: pam_unix(sshd:session): session closed for user core May 15 00:54:55.800000 audit[5388]: USER_END pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.802000 audit[5388]: CRED_DISP pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.803466 systemd[1]: Started sshd@26-10.0.0.92:22-10.0.0.1:42280.service. May 15 00:54:55.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.92:22-10.0.0.1:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:55.804561 systemd[1]: sshd@25-10.0.0.92:22-10.0.0.1:42268.service: Deactivated successfully. May 15 00:54:55.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.92:22-10.0.0.1:42268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:55.805107 systemd[1]: session-26.scope: Deactivated successfully. May 15 00:54:55.805831 systemd-logind[1193]: Session 26 logged out. Waiting for processes to exit. May 15 00:54:55.807111 systemd-logind[1193]: Removed session 26. May 15 00:54:55.830000 audit[5408]: USER_ACCT pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.832003 sshd[5408]: Accepted publickey for core from 10.0.0.1 port 42280 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:54:55.831000 audit[5408]: CRED_ACQ pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.831000 audit[5408]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1a47e910 a2=3 a3=0 items=0 ppid=1 pid=5408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:54:55.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:54:55.832971 sshd[5408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:54:55.836147 systemd-logind[1193]: New session 27 of user core. May 15 00:54:55.836832 systemd[1]: Started session-27.scope. May 15 00:54:55.839000 audit[5408]: USER_START pid=5408 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:55.840000 audit[5411]: CRED_ACQ pid=5411 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:56.015480 sshd[5408]: pam_unix(sshd:session): session closed for user core May 15 00:54:56.015000 audit[5408]: USER_END pid=5408 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:56.015000 audit[5408]: CRED_DISP pid=5408 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:54:56.017897 systemd[1]: sshd@26-10.0.0.92:22-10.0.0.1:42280.service: Deactivated successfully. May 15 00:54:56.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.92:22-10.0.0.1:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:54:56.018666 systemd[1]: session-27.scope: Deactivated successfully. May 15 00:54:56.019419 systemd-logind[1193]: Session 27 logged out. Waiting for processes to exit. May 15 00:54:56.020185 systemd-logind[1193]: Removed session 27. May 15 00:54:56.420750 systemd[1]: run-containerd-runc-k8s.io-423ab4205f26c4bea8b5b89a848c15823b1d6b7777ce50aaddd0c79c30274f3b-runc.8QswH9.mount: Deactivated successfully. May 15 00:54:56.764994 kubelet[1936]: E0515 00:54:56.764857 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:55:01.019749 systemd[1]: Started sshd@27-10.0.0.92:22-10.0.0.1:55322.service. May 15 00:55:01.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.92:22-10.0.0.1:55322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:01.020705 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 00:55:01.020786 kernel: audit: type=1130 audit(1747270501.018:1598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.92:22-10.0.0.1:55322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:01.046000 audit[5449]: USER_ACCT pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.048055 sshd[5449]: Accepted publickey for core from 10.0.0.1 port 55322 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:55:01.050000 audit[5449]: CRED_ACQ pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.052197 sshd[5449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:55:01.055463 kernel: audit: type=1101 audit(1747270501.046:1599): pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.055557 kernel: audit: type=1103 audit(1747270501.050:1600): pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.055603 kernel: audit: type=1006 audit(1747270501.050:1601): pid=5449 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 15 00:55:01.056034 systemd-logind[1193]: New session 28 of user core. May 15 00:55:01.056522 systemd[1]: Started session-28.scope. May 15 00:55:01.050000 audit[5449]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e16b5b0 a2=3 a3=0 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:01.061944 kernel: audit: type=1300 audit(1747270501.050:1601): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e16b5b0 a2=3 a3=0 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:01.061995 kernel: audit: type=1327 audit(1747270501.050:1601): proctitle=737368643A20636F7265205B707269765D May 15 00:55:01.050000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:55:01.060000 audit[5449]: USER_START pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.067466 kernel: audit: type=1105 audit(1747270501.060:1602): pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.067529 kernel: audit: type=1103 audit(1747270501.061:1603): pid=5451 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.061000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.154266 sshd[5449]: pam_unix(sshd:session): session closed for user core May 15 00:55:01.154000 audit[5449]: USER_END pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.156668 systemd[1]: sshd@27-10.0.0.92:22-10.0.0.1:55322.service: Deactivated successfully. May 15 00:55:01.157510 systemd[1]: session-28.scope: Deactivated successfully. May 15 00:55:01.158370 systemd-logind[1193]: Session 28 logged out. Waiting for processes to exit. May 15 00:55:01.159040 systemd-logind[1193]: Removed session 28. May 15 00:55:01.154000 audit[5449]: CRED_DISP pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.163729 kernel: audit: type=1106 audit(1747270501.154:1604): pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.163806 kernel: audit: type=1104 audit(1747270501.154:1605): pid=5449 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:01.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.92:22-10.0.0.1:55322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:01.634000 audit[5463]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5463 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:55:01.634000 audit[5463]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdbb727dc0 a2=0 a3=7ffdbb727dac items=0 ppid=2081 pid=5463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:01.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:55:01.643000 audit[5463]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5463 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:55:01.643000 audit[5463]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdbb727dc0 a2=0 a3=7ffdbb727dac items=0 ppid=2081 pid=5463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:01.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:55:01.764613 kubelet[1936]: E0515 00:55:01.764569 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:55:02.707440 kubelet[1936]: E0515 00:55:02.707401 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:55:06.158824 systemd[1]: Started sshd@28-10.0.0.92:22-10.0.0.1:55326.service. May 15 00:55:06.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.92:22-10.0.0.1:55326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:06.160487 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 00:55:06.160536 kernel: audit: type=1130 audit(1747270506.158:1609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.92:22-10.0.0.1:55326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:06.187000 audit[5490]: USER_ACCT pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.188647 sshd[5490]: Accepted publickey for core from 10.0.0.1 port 55326 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:55:06.190408 sshd[5490]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:55:06.189000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.193849 systemd-logind[1193]: New session 29 of user core. May 15 00:55:06.194670 systemd[1]: Started session-29.scope. May 15 00:55:06.196595 kernel: audit: type=1101 audit(1747270506.187:1610): pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.196673 kernel: audit: type=1103 audit(1747270506.189:1611): pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.196702 kernel: audit: type=1006 audit(1747270506.189:1612): pid=5490 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 15 00:55:06.199146 kernel: audit: type=1300 audit(1747270506.189:1612): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff358ce0 a2=3 a3=0 items=0 ppid=1 pid=5490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:06.189000 audit[5490]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff358ce0 a2=3 a3=0 items=0 ppid=1 pid=5490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:06.204291 kernel: audit: type=1327 audit(1747270506.189:1612): proctitle=737368643A20636F7265205B707269765D May 15 00:55:06.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:55:06.198000 audit[5490]: USER_START pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.210031 kernel: audit: type=1105 audit(1747270506.198:1613): pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.210080 kernel: audit: type=1103 audit(1747270506.199:1614): pid=5492 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.199000 audit[5492]: CRED_ACQ pid=5492 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.293339 sshd[5490]: pam_unix(sshd:session): session closed for user core May 15 00:55:06.293000 audit[5490]: USER_END pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.295567 systemd[1]: sshd@28-10.0.0.92:22-10.0.0.1:55326.service: Deactivated successfully. May 15 00:55:06.296288 systemd[1]: session-29.scope: Deactivated successfully. May 15 00:55:06.298549 systemd-logind[1193]: Session 29 logged out. Waiting for processes to exit. May 15 00:55:06.293000 audit[5490]: CRED_DISP pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.299359 systemd-logind[1193]: Removed session 29. May 15 00:55:06.302616 kernel: audit: type=1106 audit(1747270506.293:1615): pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.302664 kernel: audit: type=1104 audit(1747270506.293:1616): pid=5490 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:06.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.92:22-10.0.0.1:55326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:11.298429 systemd[1]: Started sshd@29-10.0.0.92:22-10.0.0.1:60704.service. May 15 00:55:11.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.92:22-10.0.0.1:60704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:11.299801 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:55:11.299862 kernel: audit: type=1130 audit(1747270511.297:1618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.92:22-10.0.0.1:60704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:11.331000 audit[5505]: USER_ACCT pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.332629 sshd[5505]: Accepted publickey for core from 10.0.0.1 port 60704 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:55:11.335000 audit[5505]: CRED_ACQ pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.336949 kernel: audit: type=1101 audit(1747270511.331:1619): pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.337100 kernel: audit: type=1103 audit(1747270511.335:1620): pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.337080 sshd[5505]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:55:11.340965 systemd-logind[1193]: New session 30 of user core. May 15 00:55:11.341745 systemd[1]: Started session-30.scope. May 15 00:55:11.343281 kernel: audit: type=1006 audit(1747270511.335:1621): pid=5505 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 15 00:55:11.343331 kernel: audit: type=1300 audit(1747270511.335:1621): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda541bf60 a2=3 a3=0 items=0 ppid=1 pid=5505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:11.335000 audit[5505]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda541bf60 a2=3 a3=0 items=0 ppid=1 pid=5505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:11.335000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:55:11.349226 kernel: audit: type=1327 audit(1747270511.335:1621): proctitle=737368643A20636F7265205B707269765D May 15 00:55:11.349261 kernel: audit: type=1105 audit(1747270511.345:1622): pid=5505 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.345000 audit[5505]: USER_START pid=5505 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.346000 audit[5508]: CRED_ACQ pid=5508 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.356778 kernel: audit: type=1103 audit(1747270511.346:1623): pid=5508 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.477516 sshd[5505]: pam_unix(sshd:session): session closed for user core May 15 00:55:11.477000 audit[5505]: USER_END pid=5505 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.480125 systemd[1]: sshd@29-10.0.0.92:22-10.0.0.1:60704.service: Deactivated successfully. May 15 00:55:11.480858 systemd[1]: session-30.scope: Deactivated successfully. May 15 00:55:11.481739 systemd-logind[1193]: Session 30 logged out. Waiting for processes to exit. May 15 00:55:11.482439 systemd-logind[1193]: Removed session 30. May 15 00:55:11.477000 audit[5505]: CRED_DISP pid=5505 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.486275 kernel: audit: type=1106 audit(1747270511.477:1624): pid=5505 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.486324 kernel: audit: type=1104 audit(1747270511.477:1625): pid=5505 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:11.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.92:22-10.0.0.1:60704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:16.481322 systemd[1]: Started sshd@30-10.0.0.92:22-10.0.0.1:60710.service. May 15 00:55:16.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.92:22-10.0.0.1:60710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:16.482873 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:55:16.482929 kernel: audit: type=1130 audit(1747270516.480:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.92:22-10.0.0.1:60710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:16.509000 audit[5525]: USER_ACCT pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.510892 sshd[5525]: Accepted publickey for core from 10.0.0.1 port 60710 ssh2: RSA SHA256:ssM3xoNo8tNgrxXV0NldYD5bf8Pu5BYi5TbjlfdpxM4 May 15 00:55:16.514000 audit[5525]: CRED_ACQ pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.515394 sshd[5525]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:55:16.519819 kernel: audit: type=1101 audit(1747270516.509:1628): pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.519881 kernel: audit: type=1103 audit(1747270516.514:1629): pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.521071 systemd[1]: Started session-31.scope. May 15 00:55:16.521570 systemd-logind[1193]: New session 31 of user core. May 15 00:55:16.514000 audit[5525]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc778fd490 a2=3 a3=0 items=0 ppid=1 pid=5525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:16.528279 kernel: audit: type=1006 audit(1747270516.514:1630): pid=5525 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 May 15 00:55:16.528351 kernel: audit: type=1300 audit(1747270516.514:1630): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc778fd490 a2=3 a3=0 items=0 ppid=1 pid=5525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:16.528398 kernel: audit: type=1327 audit(1747270516.514:1630): proctitle=737368643A20636F7265205B707269765D May 15 00:55:16.514000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:55:16.529933 kernel: audit: type=1105 audit(1747270516.527:1631): pid=5525 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.527000 audit[5525]: USER_START pid=5525 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.531000 audit[5527]: CRED_ACQ pid=5527 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.537855 kernel: audit: type=1103 audit(1747270516.531:1632): pid=5527 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.628739 sshd[5525]: pam_unix(sshd:session): session closed for user core May 15 00:55:16.628000 audit[5525]: USER_END pid=5525 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.631311 systemd[1]: sshd@30-10.0.0.92:22-10.0.0.1:60710.service: Deactivated successfully. May 15 00:55:16.632013 systemd[1]: session-31.scope: Deactivated successfully. May 15 00:55:16.632756 systemd-logind[1193]: Session 31 logged out. Waiting for processes to exit. May 15 00:55:16.633641 systemd-logind[1193]: Removed session 31. May 15 00:55:16.628000 audit[5525]: CRED_DISP pid=5525 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.638034 kernel: audit: type=1106 audit(1747270516.628:1633): pid=5525 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.638065 kernel: audit: type=1104 audit(1747270516.628:1634): pid=5525 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:55:16.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.92:22-10.0.0.1:60710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:17.630000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.630000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.630000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00313b480 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:55:17.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:55:17.630000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c29320 a2=fc6 a3=0 items=0 ppid=1675 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c771 key=(null) May 15 00:55:17.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:55:17.660000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.660000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.660000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00816ac00 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:55:17.660000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00898f040 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:55:17.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:55:17.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:55:17.661000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.661000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00810a8a0 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:55:17.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:55:17.662000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.662000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00810a9c0 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:55:17.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:55:17.662000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.662000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0079c2200 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:55:17.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:55:17.670000 audit[1777]: AVC avc: denied { watch } for pid=1777 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:55:17.670000 audit[1777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00816ac30 a2=fc6 a3=0 items=0 ppid=1639 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c800 key=(null) May 15 00:55:17.670000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E