May 15 00:55:49.820435 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 00:55:49.820452 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:55:49.820461 kernel: BIOS-provided physical RAM map: May 15 00:55:49.820466 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 00:55:49.820472 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 00:55:49.820477 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 00:55:49.820484 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 15 00:55:49.820489 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 00:55:49.820495 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 00:55:49.820501 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 00:55:49.820506 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 15 00:55:49.820512 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 00:55:49.820517 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 00:55:49.820523 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 00:55:49.820530 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 00:55:49.820537 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 00:55:49.820543 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 00:55:49.820548 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:55:49.820554 kernel: NX (Execute Disable) protection: active May 15 00:55:49.820560 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 00:55:49.820566 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 00:55:49.820572 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 00:55:49.820578 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 00:55:49.820583 kernel: extended physical RAM map: May 15 00:55:49.820589 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 00:55:49.820596 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 00:55:49.820602 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 00:55:49.820608 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 15 00:55:49.820614 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 00:55:49.820619 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 00:55:49.820625 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 00:55:49.820631 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 15 00:55:49.820637 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 15 00:55:49.820642 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 15 00:55:49.820655 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 15 00:55:49.820661 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 15 00:55:49.820668 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 00:55:49.820674 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 00:55:49.820680 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 00:55:49.820686 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 00:55:49.820694 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 00:55:49.820700 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 00:55:49.820707 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:55:49.820714 kernel: efi: EFI v2.70 by EDK II May 15 00:55:49.820720 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 15 00:55:49.820727 kernel: random: crng init done May 15 00:55:49.820733 kernel: SMBIOS 2.8 present. May 15 00:55:49.820739 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 15 00:55:49.820745 kernel: Hypervisor detected: KVM May 15 00:55:49.820751 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 00:55:49.820758 kernel: kvm-clock: cpu 0, msr 68196001, primary cpu clock May 15 00:55:49.820773 kernel: kvm-clock: using sched offset of 4037569142 cycles May 15 00:55:49.820781 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 00:55:49.820788 kernel: tsc: Detected 2794.746 MHz processor May 15 00:55:49.820795 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 00:55:49.820801 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 00:55:49.820808 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 15 00:55:49.820814 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 00:55:49.820820 kernel: Using GB pages for direct mapping May 15 00:55:49.820827 kernel: Secure boot disabled May 15 00:55:49.820833 kernel: ACPI: Early table checksum verification disabled May 15 00:55:49.820841 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 15 00:55:49.820847 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 15 00:55:49.820854 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:55:49.820860 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:55:49.820866 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 15 00:55:49.820873 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:55:49.820879 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:55:49.820886 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:55:49.820892 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:55:49.820900 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 15 00:55:49.820906 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 15 00:55:49.820913 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 15 00:55:49.820919 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 15 00:55:49.820925 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 15 00:55:49.820932 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 15 00:55:49.820938 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 15 00:55:49.820944 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 15 00:55:49.820951 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 15 00:55:49.820958 kernel: No NUMA configuration found May 15 00:55:49.820964 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 15 00:55:49.820971 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 15 00:55:49.820977 kernel: Zone ranges: May 15 00:55:49.820983 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 00:55:49.820990 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 15 00:55:49.820996 kernel: Normal empty May 15 00:55:49.821002 kernel: Movable zone start for each node May 15 00:55:49.821009 kernel: Early memory node ranges May 15 00:55:49.821016 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 15 00:55:49.821023 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 15 00:55:49.821029 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 15 00:55:49.821035 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 15 00:55:49.821042 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 15 00:55:49.821048 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 15 00:55:49.821054 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 15 00:55:49.821060 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:55:49.821067 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 15 00:55:49.821073 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 15 00:55:49.821081 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:55:49.821087 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 15 00:55:49.821094 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 15 00:55:49.821101 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 15 00:55:49.821107 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 00:55:49.821113 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 00:55:49.821120 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 00:55:49.821126 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 00:55:49.821133 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 00:55:49.821140 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 00:55:49.821146 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 00:55:49.821153 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 00:55:49.821159 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 00:55:49.821166 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 00:55:49.821172 kernel: TSC deadline timer available May 15 00:55:49.821178 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 00:55:49.821185 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 00:55:49.821191 kernel: kvm-guest: setup PV sched yield May 15 00:55:49.821199 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 15 00:55:49.821205 kernel: Booting paravirtualized kernel on KVM May 15 00:55:49.821216 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 00:55:49.821224 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 00:55:49.821231 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 00:55:49.821237 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 00:55:49.821244 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 00:55:49.821250 kernel: kvm-guest: setup async PF for cpu 0 May 15 00:55:49.821257 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 15 00:55:49.821264 kernel: kvm-guest: PV spinlocks enabled May 15 00:55:49.821271 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 00:55:49.821277 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 15 00:55:49.821285 kernel: Policy zone: DMA32 May 15 00:55:49.821293 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:55:49.821300 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 00:55:49.821307 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 00:55:49.821315 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 00:55:49.821322 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 00:55:49.821330 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 15 00:55:49.821337 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 00:55:49.821344 kernel: ftrace: allocating 34584 entries in 136 pages May 15 00:55:49.821350 kernel: ftrace: allocated 136 pages with 2 groups May 15 00:55:49.821357 kernel: rcu: Hierarchical RCU implementation. May 15 00:55:49.821364 kernel: rcu: RCU event tracing is enabled. May 15 00:55:49.821371 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 00:55:49.821380 kernel: Rude variant of Tasks RCU enabled. May 15 00:55:49.821386 kernel: Tracing variant of Tasks RCU enabled. May 15 00:55:49.821393 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 00:55:49.821400 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 00:55:49.821407 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 00:55:49.821414 kernel: Console: colour dummy device 80x25 May 15 00:55:49.821421 kernel: printk: console [ttyS0] enabled May 15 00:55:49.821427 kernel: ACPI: Core revision 20210730 May 15 00:55:49.821434 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 00:55:49.821443 kernel: APIC: Switch to symmetric I/O mode setup May 15 00:55:49.821449 kernel: x2apic enabled May 15 00:55:49.821456 kernel: Switched APIC routing to physical x2apic. May 15 00:55:49.821463 kernel: kvm-guest: setup PV IPIs May 15 00:55:49.821470 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 00:55:49.821476 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 00:55:49.821483 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 15 00:55:49.821490 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 00:55:49.821497 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 00:55:49.821505 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 00:55:49.821512 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 00:55:49.821519 kernel: Spectre V2 : Mitigation: Retpolines May 15 00:55:49.821526 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 00:55:49.821533 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 00:55:49.821540 kernel: RETBleed: Mitigation: untrained return thunk May 15 00:55:49.821547 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 00:55:49.821554 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 00:55:49.821561 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 00:55:49.821569 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 00:55:49.821576 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 00:55:49.821583 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 00:55:49.821590 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 00:55:49.821596 kernel: Freeing SMP alternatives memory: 32K May 15 00:55:49.821603 kernel: pid_max: default: 32768 minimum: 301 May 15 00:55:49.821610 kernel: LSM: Security Framework initializing May 15 00:55:49.821617 kernel: SELinux: Initializing. May 15 00:55:49.821623 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:55:49.821631 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:55:49.821638 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 00:55:49.821651 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 00:55:49.821658 kernel: ... version: 0 May 15 00:55:49.821664 kernel: ... bit width: 48 May 15 00:55:49.821671 kernel: ... generic registers: 6 May 15 00:55:49.821678 kernel: ... value mask: 0000ffffffffffff May 15 00:55:49.821685 kernel: ... max period: 00007fffffffffff May 15 00:55:49.821692 kernel: ... fixed-purpose events: 0 May 15 00:55:49.821700 kernel: ... event mask: 000000000000003f May 15 00:55:49.821706 kernel: signal: max sigframe size: 1776 May 15 00:55:49.821713 kernel: rcu: Hierarchical SRCU implementation. May 15 00:55:49.821720 kernel: smp: Bringing up secondary CPUs ... May 15 00:55:49.821727 kernel: x86: Booting SMP configuration: May 15 00:55:49.821734 kernel: .... node #0, CPUs: #1 May 15 00:55:49.821741 kernel: kvm-clock: cpu 1, msr 68196041, secondary cpu clock May 15 00:55:49.821747 kernel: kvm-guest: setup async PF for cpu 1 May 15 00:55:49.821754 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 15 00:55:49.821776 kernel: #2 May 15 00:55:49.821783 kernel: kvm-clock: cpu 2, msr 68196081, secondary cpu clock May 15 00:55:49.821790 kernel: kvm-guest: setup async PF for cpu 2 May 15 00:55:49.821796 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 15 00:55:49.821803 kernel: #3 May 15 00:55:49.821810 kernel: kvm-clock: cpu 3, msr 681960c1, secondary cpu clock May 15 00:55:49.821817 kernel: kvm-guest: setup async PF for cpu 3 May 15 00:55:49.821823 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 15 00:55:49.821830 kernel: smp: Brought up 1 node, 4 CPUs May 15 00:55:49.821837 kernel: smpboot: Max logical packages: 1 May 15 00:55:49.821845 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 15 00:55:49.821852 kernel: devtmpfs: initialized May 15 00:55:49.821858 kernel: x86/mm: Memory block size: 128MB May 15 00:55:49.821865 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 15 00:55:49.821872 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 15 00:55:49.821879 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 15 00:55:49.821895 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 15 00:55:49.821902 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 15 00:55:49.821909 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 00:55:49.821918 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 00:55:49.821924 kernel: pinctrl core: initialized pinctrl subsystem May 15 00:55:49.821931 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 00:55:49.821938 kernel: audit: initializing netlink subsys (disabled) May 15 00:55:49.821945 kernel: audit: type=2000 audit(1747270549.179:1): state=initialized audit_enabled=0 res=1 May 15 00:55:49.821952 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 00:55:49.821959 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 00:55:49.821965 kernel: cpuidle: using governor menu May 15 00:55:49.821972 kernel: ACPI: bus type PCI registered May 15 00:55:49.821980 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 00:55:49.821987 kernel: dca service started, version 1.12.1 May 15 00:55:49.821994 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 00:55:49.822000 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 00:55:49.822007 kernel: PCI: Using configuration type 1 for base access May 15 00:55:49.822014 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 00:55:49.822021 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 00:55:49.822028 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 00:55:49.822036 kernel: ACPI: Added _OSI(Module Device) May 15 00:55:49.822042 kernel: ACPI: Added _OSI(Processor Device) May 15 00:55:49.822049 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 00:55:49.822056 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 00:55:49.822063 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 00:55:49.822069 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 00:55:49.822076 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 00:55:49.822083 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 00:55:49.822090 kernel: ACPI: Interpreter enabled May 15 00:55:49.822097 kernel: ACPI: PM: (supports S0 S3 S5) May 15 00:55:49.822105 kernel: ACPI: Using IOAPIC for interrupt routing May 15 00:55:49.822111 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 00:55:49.822118 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 00:55:49.822125 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 00:55:49.822237 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 00:55:49.822309 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 00:55:49.822375 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 00:55:49.822386 kernel: PCI host bridge to bus 0000:00 May 15 00:55:49.822457 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 00:55:49.822519 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 00:55:49.822579 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 00:55:49.822641 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 00:55:49.822709 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 00:55:49.822782 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 15 00:55:49.822846 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 00:55:49.822928 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 00:55:49.823006 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 00:55:49.823076 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 15 00:55:49.823146 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 15 00:55:49.823257 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 15 00:55:49.823348 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 15 00:55:49.823478 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 00:55:49.823560 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 00:55:49.823633 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 15 00:55:49.824056 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 15 00:55:49.824138 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 15 00:55:49.824220 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 00:55:49.824292 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 15 00:55:49.824361 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 15 00:55:49.824429 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 15 00:55:49.824501 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 00:55:49.824569 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 15 00:55:49.824635 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 15 00:55:49.824713 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 15 00:55:49.824797 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 15 00:55:49.824871 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 00:55:49.824937 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 00:55:49.825008 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 00:55:49.825075 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 15 00:55:49.825140 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 15 00:55:49.825213 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 00:55:49.825284 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 15 00:55:49.825293 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 00:55:49.825300 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 00:55:49.825307 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 00:55:49.825314 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 00:55:49.825321 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 00:55:49.825328 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 00:55:49.825335 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 00:55:49.825343 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 00:55:49.825350 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 00:55:49.825357 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 00:55:49.825364 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 00:55:49.825371 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 00:55:49.825377 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 00:55:49.825384 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 00:55:49.825391 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 00:55:49.825397 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 00:55:49.825406 kernel: iommu: Default domain type: Translated May 15 00:55:49.825412 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 00:55:49.825478 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 00:55:49.825545 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 00:55:49.825611 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 00:55:49.825620 kernel: vgaarb: loaded May 15 00:55:49.825627 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 00:55:49.825634 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 00:55:49.825641 kernel: PTP clock support registered May 15 00:55:49.825658 kernel: Registered efivars operations May 15 00:55:49.825665 kernel: PCI: Using ACPI for IRQ routing May 15 00:55:49.825672 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 00:55:49.825678 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 15 00:55:49.825685 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 15 00:55:49.825692 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 15 00:55:49.825699 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 15 00:55:49.825710 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 15 00:55:49.825733 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 15 00:55:49.825755 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 00:55:49.825772 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 00:55:49.825778 kernel: clocksource: Switched to clocksource kvm-clock May 15 00:55:49.825785 kernel: VFS: Disk quotas dquot_6.6.0 May 15 00:55:49.825792 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 00:55:49.825799 kernel: pnp: PnP ACPI init May 15 00:55:49.825878 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 00:55:49.825889 kernel: pnp: PnP ACPI: found 6 devices May 15 00:55:49.825898 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 00:55:49.825905 kernel: NET: Registered PF_INET protocol family May 15 00:55:49.825911 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 00:55:49.825918 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 00:55:49.825925 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 00:55:49.825932 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 00:55:49.825944 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 00:55:49.825951 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 00:55:49.825960 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:55:49.825967 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:55:49.825973 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 00:55:49.825980 kernel: NET: Registered PF_XDP protocol family May 15 00:55:49.826050 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 15 00:55:49.826118 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 15 00:55:49.826180 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 00:55:49.826240 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 00:55:49.826301 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 00:55:49.826360 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 00:55:49.826420 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 00:55:49.826478 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 15 00:55:49.826487 kernel: PCI: CLS 0 bytes, default 64 May 15 00:55:49.826494 kernel: Initialise system trusted keyrings May 15 00:55:49.826501 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 00:55:49.826508 kernel: Key type asymmetric registered May 15 00:55:49.826515 kernel: Asymmetric key parser 'x509' registered May 15 00:55:49.826524 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 00:55:49.826531 kernel: io scheduler mq-deadline registered May 15 00:55:49.826545 kernel: io scheduler kyber registered May 15 00:55:49.826553 kernel: io scheduler bfq registered May 15 00:55:49.826561 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 00:55:49.826568 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 00:55:49.826575 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 00:55:49.826582 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 00:55:49.826590 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 00:55:49.826598 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 00:55:49.826606 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 00:55:49.826613 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 00:55:49.826620 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 00:55:49.826698 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 00:55:49.826709 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 00:55:49.826782 kernel: rtc_cmos 00:04: registered as rtc0 May 15 00:55:49.826846 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T00:55:49 UTC (1747270549) May 15 00:55:49.826910 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 00:55:49.826919 kernel: efifb: probing for efifb May 15 00:55:49.826926 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 15 00:55:49.826934 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 15 00:55:49.826941 kernel: efifb: scrolling: redraw May 15 00:55:49.826948 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 15 00:55:49.826955 kernel: Console: switching to colour frame buffer device 160x50 May 15 00:55:49.826962 kernel: fb0: EFI VGA frame buffer device May 15 00:55:49.826969 kernel: pstore: Registered efi as persistent store backend May 15 00:55:49.826978 kernel: NET: Registered PF_INET6 protocol family May 15 00:55:49.826985 kernel: Segment Routing with IPv6 May 15 00:55:49.826992 kernel: In-situ OAM (IOAM) with IPv6 May 15 00:55:49.827000 kernel: NET: Registered PF_PACKET protocol family May 15 00:55:49.827007 kernel: Key type dns_resolver registered May 15 00:55:49.827014 kernel: IPI shorthand broadcast: enabled May 15 00:55:49.827023 kernel: sched_clock: Marking stable (413454256, 127601781)->(583220101, -42164064) May 15 00:55:49.827030 kernel: registered taskstats version 1 May 15 00:55:49.827037 kernel: Loading compiled-in X.509 certificates May 15 00:55:49.827044 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 00:55:49.827051 kernel: Key type .fscrypt registered May 15 00:55:49.827058 kernel: Key type fscrypt-provisioning registered May 15 00:55:49.827066 kernel: pstore: Using crash dump compression: deflate May 15 00:55:49.827073 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 00:55:49.827081 kernel: ima: Allocated hash algorithm: sha1 May 15 00:55:49.827088 kernel: ima: No architecture policies found May 15 00:55:49.827096 kernel: clk: Disabling unused clocks May 15 00:55:49.827103 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 00:55:49.827111 kernel: Write protecting the kernel read-only data: 28672k May 15 00:55:49.827118 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 00:55:49.827125 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 00:55:49.827132 kernel: Run /init as init process May 15 00:55:49.827139 kernel: with arguments: May 15 00:55:49.827147 kernel: /init May 15 00:55:49.827154 kernel: with environment: May 15 00:55:49.827161 kernel: HOME=/ May 15 00:55:49.827168 kernel: TERM=linux May 15 00:55:49.827175 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 00:55:49.827184 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:55:49.827194 systemd[1]: Detected virtualization kvm. May 15 00:55:49.827201 systemd[1]: Detected architecture x86-64. May 15 00:55:49.827210 systemd[1]: Running in initrd. May 15 00:55:49.827217 systemd[1]: No hostname configured, using default hostname. May 15 00:55:49.827224 systemd[1]: Hostname set to . May 15 00:55:49.827232 systemd[1]: Initializing machine ID from VM UUID. May 15 00:55:49.827240 systemd[1]: Queued start job for default target initrd.target. May 15 00:55:49.827248 systemd[1]: Started systemd-ask-password-console.path. May 15 00:55:49.827255 systemd[1]: Reached target cryptsetup.target. May 15 00:55:49.827262 systemd[1]: Reached target paths.target. May 15 00:55:49.827270 systemd[1]: Reached target slices.target. May 15 00:55:49.827278 systemd[1]: Reached target swap.target. May 15 00:55:49.827286 systemd[1]: Reached target timers.target. May 15 00:55:49.827294 systemd[1]: Listening on iscsid.socket. May 15 00:55:49.827301 systemd[1]: Listening on iscsiuio.socket. May 15 00:55:49.827309 systemd[1]: Listening on systemd-journald-audit.socket. May 15 00:55:49.827317 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 00:55:49.827324 systemd[1]: Listening on systemd-journald.socket. May 15 00:55:49.827333 systemd[1]: Listening on systemd-networkd.socket. May 15 00:55:49.827341 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:55:49.827349 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:55:49.827356 systemd[1]: Reached target sockets.target. May 15 00:55:49.827364 systemd[1]: Starting kmod-static-nodes.service... May 15 00:55:49.827371 systemd[1]: Finished network-cleanup.service. May 15 00:55:49.827379 systemd[1]: Starting systemd-fsck-usr.service... May 15 00:55:49.827386 systemd[1]: Starting systemd-journald.service... May 15 00:55:49.827394 systemd[1]: Starting systemd-modules-load.service... May 15 00:55:49.827402 systemd[1]: Starting systemd-resolved.service... May 15 00:55:49.827410 systemd[1]: Starting systemd-vconsole-setup.service... May 15 00:55:49.827417 systemd[1]: Finished kmod-static-nodes.service. May 15 00:55:49.827425 systemd[1]: Finished systemd-fsck-usr.service. May 15 00:55:49.827433 kernel: audit: type=1130 audit(1747270549.820:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.827440 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 00:55:49.827450 systemd-journald[197]: Journal started May 15 00:55:49.827486 systemd-journald[197]: Runtime Journal (/run/log/journal/3a183f5a5e6e4eeabf62266b00c3f4b6) is 6.0M, max 48.4M, 42.4M free. May 15 00:55:49.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.823457 systemd-modules-load[198]: Inserted module 'overlay' May 15 00:55:49.829181 systemd[1]: Started systemd-journald.service. May 15 00:55:49.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.833671 systemd[1]: Finished systemd-vconsole-setup.service. May 15 00:55:49.835408 kernel: audit: type=1130 audit(1747270549.829:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.835422 kernel: audit: type=1130 audit(1747270549.835:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.838442 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 00:55:49.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.843918 kernel: audit: type=1130 audit(1747270549.840:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.843888 systemd[1]: Starting dracut-cmdline-ask.service... May 15 00:55:49.851960 systemd-resolved[199]: Positive Trust Anchors: May 15 00:55:49.852377 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:55:49.852542 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:55:49.855241 systemd-resolved[199]: Defaulting to hostname 'linux'. May 15 00:55:49.856056 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 00:55:49.856372 systemd[1]: Started systemd-resolved.service. May 15 00:55:49.856787 systemd[1]: Reached target nss-lookup.target. May 15 00:55:49.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.864630 systemd[1]: Finished dracut-cmdline-ask.service. May 15 00:55:49.872828 kernel: audit: type=1130 audit(1747270549.851:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.872850 kernel: audit: type=1130 audit(1747270549.867:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.872860 kernel: Bridge firewalling registered May 15 00:55:49.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.870827 systemd[1]: Starting dracut-cmdline.service... May 15 00:55:49.872798 systemd-modules-load[198]: Inserted module 'br_netfilter' May 15 00:55:49.878497 dracut-cmdline[214]: dracut-dracut-053 May 15 00:55:49.880302 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:55:49.889786 kernel: SCSI subsystem initialized May 15 00:55:49.900787 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 00:55:49.900809 kernel: device-mapper: uevent: version 1.0.3 May 15 00:55:49.900819 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 00:55:49.904611 systemd-modules-load[198]: Inserted module 'dm_multipath' May 15 00:55:49.905200 systemd[1]: Finished systemd-modules-load.service. May 15 00:55:49.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.907020 systemd[1]: Starting systemd-sysctl.service... May 15 00:55:49.911474 kernel: audit: type=1130 audit(1747270549.906:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.917190 systemd[1]: Finished systemd-sysctl.service. May 15 00:55:49.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.921797 kernel: audit: type=1130 audit(1747270549.918:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:49.937783 kernel: Loading iSCSI transport class v2.0-870. May 15 00:55:49.953781 kernel: iscsi: registered transport (tcp) May 15 00:55:49.974238 kernel: iscsi: registered transport (qla4xxx) May 15 00:55:49.974251 kernel: QLogic iSCSI HBA Driver May 15 00:55:50.002291 systemd[1]: Finished dracut-cmdline.service. May 15 00:55:50.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:50.004575 systemd[1]: Starting dracut-pre-udev.service... May 15 00:55:50.008221 kernel: audit: type=1130 audit(1747270550.003:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:50.048795 kernel: raid6: avx2x4 gen() 30396 MB/s May 15 00:55:50.065790 kernel: raid6: avx2x4 xor() 7619 MB/s May 15 00:55:50.082788 kernel: raid6: avx2x2 gen() 32425 MB/s May 15 00:55:50.099796 kernel: raid6: avx2x2 xor() 19162 MB/s May 15 00:55:50.116788 kernel: raid6: avx2x1 gen() 26450 MB/s May 15 00:55:50.133789 kernel: raid6: avx2x1 xor() 15339 MB/s May 15 00:55:50.150790 kernel: raid6: sse2x4 gen() 14835 MB/s May 15 00:55:50.167787 kernel: raid6: sse2x4 xor() 7086 MB/s May 15 00:55:50.184790 kernel: raid6: sse2x2 gen() 16187 MB/s May 15 00:55:50.201787 kernel: raid6: sse2x2 xor() 9835 MB/s May 15 00:55:50.218788 kernel: raid6: sse2x1 gen() 12046 MB/s May 15 00:55:50.236173 kernel: raid6: sse2x1 xor() 7831 MB/s May 15 00:55:50.236191 kernel: raid6: using algorithm avx2x2 gen() 32425 MB/s May 15 00:55:50.236201 kernel: raid6: .... xor() 19162 MB/s, rmw enabled May 15 00:55:50.236886 kernel: raid6: using avx2x2 recovery algorithm May 15 00:55:50.248792 kernel: xor: automatically using best checksumming function avx May 15 00:55:50.335790 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 00:55:50.343133 systemd[1]: Finished dracut-pre-udev.service. May 15 00:55:50.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:50.344000 audit: BPF prog-id=7 op=LOAD May 15 00:55:50.344000 audit: BPF prog-id=8 op=LOAD May 15 00:55:50.345453 systemd[1]: Starting systemd-udevd.service... May 15 00:55:50.356674 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 15 00:55:50.360295 systemd[1]: Started systemd-udevd.service. May 15 00:55:50.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:50.362799 systemd[1]: Starting dracut-pre-trigger.service... May 15 00:55:50.371700 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 00:55:50.392901 systemd[1]: Finished dracut-pre-trigger.service. May 15 00:55:50.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:50.395092 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:55:50.425492 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:55:50.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:50.453786 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 00:55:50.471253 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 00:55:50.471273 kernel: GPT:9289727 != 19775487 May 15 00:55:50.471282 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 00:55:50.471291 kernel: GPT:9289727 != 19775487 May 15 00:55:50.471299 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 00:55:50.471308 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:55:50.471317 kernel: cryptd: max_cpu_qlen set to 1000 May 15 00:55:50.471325 kernel: libata version 3.00 loaded. May 15 00:55:50.471334 kernel: AVX2 version of gcm_enc/dec engaged. May 15 00:55:50.471343 kernel: AES CTR mode by8 optimization enabled May 15 00:55:50.476404 kernel: ahci 0000:00:1f.2: version 3.0 May 15 00:55:50.498977 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 00:55:50.498991 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 00:55:50.499076 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 00:55:50.499150 kernel: scsi host0: ahci May 15 00:55:50.499237 kernel: scsi host1: ahci May 15 00:55:50.499318 kernel: scsi host2: ahci May 15 00:55:50.499402 kernel: scsi host3: ahci May 15 00:55:50.499488 kernel: scsi host4: ahci May 15 00:55:50.499569 kernel: scsi host5: ahci May 15 00:55:50.499661 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 31 May 15 00:55:50.499671 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 31 May 15 00:55:50.499681 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 31 May 15 00:55:50.499689 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 31 May 15 00:55:50.499701 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 31 May 15 00:55:50.499709 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 31 May 15 00:55:50.497621 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 00:55:50.499812 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 00:55:50.501801 systemd[1]: Starting disk-uuid.service... May 15 00:55:50.511935 disk-uuid[536]: Primary Header is updated. May 15 00:55:50.511935 disk-uuid[536]: Secondary Entries is updated. May 15 00:55:50.511935 disk-uuid[536]: Secondary Header is updated. May 15 00:55:50.517560 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) May 15 00:55:50.520554 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 00:55:50.525472 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 00:55:50.535438 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:55:50.812239 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 00:55:50.812299 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 00:55:50.812316 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 00:55:50.812325 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 00:55:50.812334 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 00:55:50.813803 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 00:55:50.814792 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 00:55:50.816286 kernel: ata3.00: applying bridge limits May 15 00:55:50.816307 kernel: ata3.00: configured for UDMA/100 May 15 00:55:50.816788 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 00:55:50.845782 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 00:55:50.862274 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 00:55:50.862292 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 00:55:51.517791 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:55:51.518057 disk-uuid[537]: The operation has completed successfully. May 15 00:55:51.538892 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 00:55:51.538999 systemd[1]: Finished disk-uuid.service. May 15 00:55:51.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.551104 systemd[1]: Starting verity-setup.service... May 15 00:55:51.562794 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 00:55:51.578557 systemd[1]: Found device dev-mapper-usr.device. May 15 00:55:51.580708 systemd[1]: Mounting sysusr-usr.mount... May 15 00:55:51.582315 systemd[1]: Finished verity-setup.service. May 15 00:55:51.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.641245 systemd[1]: Mounted sysusr-usr.mount. May 15 00:55:51.643284 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 00:55:51.642042 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 00:55:51.642557 systemd[1]: Starting ignition-setup.service... May 15 00:55:51.643799 systemd[1]: Starting parse-ip-for-networkd.service... May 15 00:55:51.650856 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:55:51.650879 kernel: BTRFS info (device vda6): using free space tree May 15 00:55:51.650888 kernel: BTRFS info (device vda6): has skinny extents May 15 00:55:51.658051 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 00:55:51.666122 systemd[1]: Finished ignition-setup.service. May 15 00:55:51.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.666808 systemd[1]: Starting ignition-fetch-offline.service... May 15 00:55:51.701836 systemd[1]: Finished parse-ip-for-networkd.service. May 15 00:55:51.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.702000 audit: BPF prog-id=9 op=LOAD May 15 00:55:51.703935 systemd[1]: Starting systemd-networkd.service... May 15 00:55:51.706790 ignition[650]: Ignition 2.14.0 May 15 00:55:51.706801 ignition[650]: Stage: fetch-offline May 15 00:55:51.706853 ignition[650]: no configs at "/usr/lib/ignition/base.d" May 15 00:55:51.706861 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:55:51.706954 ignition[650]: parsed url from cmdline: "" May 15 00:55:51.706957 ignition[650]: no config URL provided May 15 00:55:51.706961 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" May 15 00:55:51.706967 ignition[650]: no config at "/usr/lib/ignition/user.ign" May 15 00:55:51.706982 ignition[650]: op(1): [started] loading QEMU firmware config module May 15 00:55:51.706986 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 00:55:51.716587 ignition[650]: op(1): [finished] loading QEMU firmware config module May 15 00:55:51.724889 systemd-networkd[718]: lo: Link UP May 15 00:55:51.724897 systemd-networkd[718]: lo: Gained carrier May 15 00:55:51.725255 systemd-networkd[718]: Enumeration completed May 15 00:55:51.725427 systemd-networkd[718]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:55:51.725497 systemd[1]: Started systemd-networkd.service. May 15 00:55:51.726277 systemd-networkd[718]: eth0: Link UP May 15 00:55:51.726280 systemd-networkd[718]: eth0: Gained carrier May 15 00:55:51.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.735232 systemd[1]: Reached target network.target. May 15 00:55:51.737665 systemd[1]: Starting iscsiuio.service... May 15 00:55:51.743103 systemd[1]: Started iscsiuio.service. May 15 00:55:51.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.744744 systemd[1]: Starting iscsid.service... May 15 00:55:51.749051 iscsid[725]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 00:55:51.749051 iscsid[725]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 00:55:51.749051 iscsid[725]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 00:55:51.749051 iscsid[725]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 00:55:51.749051 iscsid[725]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 00:55:51.749051 iscsid[725]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 00:55:51.762282 systemd[1]: Started iscsid.service. May 15 00:55:51.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.762922 systemd[1]: Starting dracut-initqueue.service... May 15 00:55:51.770949 systemd[1]: Finished dracut-initqueue.service. May 15 00:55:51.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.771067 systemd[1]: Reached target remote-fs-pre.target. May 15 00:55:51.773628 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:55:51.774047 systemd[1]: Reached target remote-fs.target. May 15 00:55:51.778008 systemd[1]: Starting dracut-pre-mount.service... May 15 00:55:51.786172 systemd[1]: Finished dracut-pre-mount.service. May 15 00:55:51.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.790648 ignition[650]: parsing config with SHA512: 682bfa66668e8d13c799674dbd49a5d8d66724903ef46e11070ea89a722a64ba1341a3d8cc304a16a01c2a14449846b8c8520456d54f2ef5724bdc5ed5f85d52 May 15 00:55:51.796826 systemd-networkd[718]: eth0: DHCPv4 address 10.0.0.118/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:55:51.798368 unknown[650]: fetched base config from "system" May 15 00:55:51.798378 unknown[650]: fetched user config from "qemu" May 15 00:55:51.800394 ignition[650]: fetch-offline: fetch-offline passed May 15 00:55:51.801229 ignition[650]: Ignition finished successfully May 15 00:55:51.802858 systemd[1]: Finished ignition-fetch-offline.service. May 15 00:55:51.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.803808 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 00:55:51.804530 systemd[1]: Starting ignition-kargs.service... May 15 00:55:51.813197 ignition[739]: Ignition 2.14.0 May 15 00:55:51.813205 ignition[739]: Stage: kargs May 15 00:55:51.813283 ignition[739]: no configs at "/usr/lib/ignition/base.d" May 15 00:55:51.813291 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:55:51.816903 ignition[739]: kargs: kargs passed May 15 00:55:51.816938 ignition[739]: Ignition finished successfully May 15 00:55:51.819075 systemd[1]: Finished ignition-kargs.service. May 15 00:55:51.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.819687 systemd[1]: Starting ignition-disks.service... May 15 00:55:51.825268 ignition[745]: Ignition 2.14.0 May 15 00:55:51.825279 ignition[745]: Stage: disks May 15 00:55:51.825364 ignition[745]: no configs at "/usr/lib/ignition/base.d" May 15 00:55:51.825372 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:55:51.826240 ignition[745]: disks: disks passed May 15 00:55:51.826271 ignition[745]: Ignition finished successfully May 15 00:55:51.830209 systemd[1]: Finished ignition-disks.service. May 15 00:55:51.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.831111 systemd[1]: Reached target initrd-root-device.target. May 15 00:55:51.831967 systemd[1]: Reached target local-fs-pre.target. May 15 00:55:51.834198 systemd[1]: Reached target local-fs.target. May 15 00:55:51.835639 systemd[1]: Reached target sysinit.target. May 15 00:55:51.837016 systemd[1]: Reached target basic.target. May 15 00:55:51.838977 systemd[1]: Starting systemd-fsck-root.service... May 15 00:55:51.848647 systemd-fsck[753]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 15 00:55:51.853802 systemd[1]: Finished systemd-fsck-root.service. May 15 00:55:51.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.854428 systemd[1]: Mounting sysroot.mount... May 15 00:55:51.861424 systemd[1]: Mounted sysroot.mount. May 15 00:55:51.862721 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 00:55:51.861515 systemd[1]: Reached target initrd-root-fs.target. May 15 00:55:51.864481 systemd[1]: Mounting sysroot-usr.mount... May 15 00:55:51.865383 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 00:55:51.865409 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 00:55:51.865426 systemd[1]: Reached target ignition-diskful.target. May 15 00:55:51.867373 systemd[1]: Mounted sysroot-usr.mount. May 15 00:55:51.869327 systemd[1]: Starting initrd-setup-root.service... May 15 00:55:51.876150 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory May 15 00:55:51.879164 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory May 15 00:55:51.882570 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory May 15 00:55:51.886185 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory May 15 00:55:51.909648 systemd[1]: Finished initrd-setup-root.service. May 15 00:55:51.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.910288 systemd[1]: Starting ignition-mount.service... May 15 00:55:51.913446 systemd[1]: Starting sysroot-boot.service... May 15 00:55:51.917233 bash[804]: umount: /sysroot/usr/share/oem: not mounted. May 15 00:55:51.925568 ignition[806]: INFO : Ignition 2.14.0 May 15 00:55:51.926674 ignition[806]: INFO : Stage: mount May 15 00:55:51.927469 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:55:51.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.928194 systemd[1]: Finished sysroot-boot.service. May 15 00:55:51.930246 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:55:51.932352 ignition[806]: INFO : mount: mount passed May 15 00:55:51.932352 ignition[806]: INFO : Ignition finished successfully May 15 00:55:51.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:51.930962 systemd[1]: Finished ignition-mount.service. May 15 00:55:52.114936 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.118 May 15 00:55:52.114950 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux11'. May 15 00:55:52.588623 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 00:55:52.597733 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (814) May 15 00:55:52.597772 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:55:52.597783 kernel: BTRFS info (device vda6): using free space tree May 15 00:55:52.598724 kernel: BTRFS info (device vda6): has skinny extents May 15 00:55:52.603503 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 00:55:52.606301 systemd[1]: Starting ignition-files.service... May 15 00:55:52.620287 ignition[834]: INFO : Ignition 2.14.0 May 15 00:55:52.620287 ignition[834]: INFO : Stage: files May 15 00:55:52.622219 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:55:52.622219 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:55:52.622219 ignition[834]: DEBUG : files: compiled without relabeling support, skipping May 15 00:55:52.626195 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 00:55:52.626195 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 00:55:52.626195 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 00:55:52.626195 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 00:55:52.626195 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 00:55:52.626195 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 15 00:55:52.626195 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 15 00:55:52.624159 unknown[834]: wrote ssh authorized keys file for user: core May 15 00:55:52.689108 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 00:55:52.963295 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 15 00:55:52.963295 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 00:55:52.967064 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 00:55:52.968729 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 00:55:52.970506 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 00:55:52.972160 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 00:55:52.973889 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 00:55:52.975560 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 00:55:52.977310 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 00:55:52.979076 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:55:52.980815 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:55:52.982486 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:55:52.984941 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:55:52.987398 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:55:52.989491 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 15 00:55:53.435350 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 00:55:53.650939 systemd-networkd[718]: eth0: Gained IPv6LL May 15 00:55:53.840196 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 00:55:53.840196 ignition[834]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 00:55:53.844580 ignition[834]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:55:53.871951 ignition[834]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:55:53.874614 ignition[834]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 00:55:53.874614 ignition[834]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 00:55:53.874614 ignition[834]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 00:55:53.874614 ignition[834]: INFO : files: files passed May 15 00:55:53.874614 ignition[834]: INFO : Ignition finished successfully May 15 00:55:53.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.873424 systemd[1]: Finished ignition-files.service. May 15 00:55:53.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.875337 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 00:55:53.877160 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 00:55:53.890477 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 00:55:53.877726 systemd[1]: Starting ignition-quench.service... May 15 00:55:53.892699 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 00:55:53.880363 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 00:55:53.880460 systemd[1]: Finished ignition-quench.service. May 15 00:55:53.884895 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 00:55:53.886731 systemd[1]: Reached target ignition-complete.target. May 15 00:55:53.896035 systemd[1]: Starting initrd-parse-etc.service... May 15 00:55:53.907785 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 00:55:53.907882 systemd[1]: Finished initrd-parse-etc.service. May 15 00:55:53.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.909847 systemd[1]: Reached target initrd-fs.target. May 15 00:55:53.911322 systemd[1]: Reached target initrd.target. May 15 00:55:53.912125 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 00:55:53.912952 systemd[1]: Starting dracut-pre-pivot.service... May 15 00:55:53.923342 systemd[1]: Finished dracut-pre-pivot.service. May 15 00:55:53.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.924853 systemd[1]: Starting initrd-cleanup.service... May 15 00:55:53.932924 systemd[1]: Stopped target nss-lookup.target. May 15 00:55:53.933869 systemd[1]: Stopped target remote-cryptsetup.target. May 15 00:55:53.935518 systemd[1]: Stopped target timers.target. May 15 00:55:53.937159 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 00:55:53.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.937245 systemd[1]: Stopped dracut-pre-pivot.service. May 15 00:55:53.938827 systemd[1]: Stopped target initrd.target. May 15 00:55:53.940461 systemd[1]: Stopped target basic.target. May 15 00:55:53.942043 systemd[1]: Stopped target ignition-complete.target. May 15 00:55:53.943667 systemd[1]: Stopped target ignition-diskful.target. May 15 00:55:53.945249 systemd[1]: Stopped target initrd-root-device.target. May 15 00:55:53.947147 systemd[1]: Stopped target remote-fs.target. May 15 00:55:53.948694 systemd[1]: Stopped target remote-fs-pre.target. May 15 00:55:53.950409 systemd[1]: Stopped target sysinit.target. May 15 00:55:53.951966 systemd[1]: Stopped target local-fs.target. May 15 00:55:53.953559 systemd[1]: Stopped target local-fs-pre.target. May 15 00:55:53.955136 systemd[1]: Stopped target swap.target. May 15 00:55:53.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.956612 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 00:55:53.956720 systemd[1]: Stopped dracut-pre-mount.service. May 15 00:55:53.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.958335 systemd[1]: Stopped target cryptsetup.target. May 15 00:55:53.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.959806 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 00:55:53.959890 systemd[1]: Stopped dracut-initqueue.service. May 15 00:55:53.961690 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 00:55:53.961786 systemd[1]: Stopped ignition-fetch-offline.service. May 15 00:55:53.963356 systemd[1]: Stopped target paths.target. May 15 00:55:53.964868 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 00:55:53.969844 systemd[1]: Stopped systemd-ask-password-console.path. May 15 00:55:53.971465 systemd[1]: Stopped target slices.target. May 15 00:55:53.973107 systemd[1]: Stopped target sockets.target. May 15 00:55:53.974626 systemd[1]: iscsid.socket: Deactivated successfully. May 15 00:55:53.974691 systemd[1]: Closed iscsid.socket. May 15 00:55:53.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.976074 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 00:55:53.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.976163 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 00:55:53.977938 systemd[1]: ignition-files.service: Deactivated successfully. May 15 00:55:53.978017 systemd[1]: Stopped ignition-files.service. May 15 00:55:53.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.987076 ignition[875]: INFO : Ignition 2.14.0 May 15 00:55:53.987076 ignition[875]: INFO : Stage: umount May 15 00:55:53.987076 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:55:53.987076 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:55:53.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.980134 systemd[1]: Stopping ignition-mount.service... May 15 00:55:53.993101 ignition[875]: INFO : umount: umount passed May 15 00:55:53.993101 ignition[875]: INFO : Ignition finished successfully May 15 00:55:53.981347 systemd[1]: Stopping iscsiuio.service... May 15 00:55:53.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:53.983130 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 00:55:53.983264 systemd[1]: Stopped kmod-static-nodes.service. May 15 00:55:53.986176 systemd[1]: Stopping sysroot-boot.service... May 15 00:55:53.987015 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 00:55:53.987169 systemd[1]: Stopped systemd-udev-trigger.service. May 15 00:55:53.990937 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 00:55:53.993021 systemd[1]: Stopped dracut-pre-trigger.service. May 15 00:55:54.005029 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 00:55:54.006428 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 00:55:54.007338 systemd[1]: Stopped iscsiuio.service. May 15 00:55:54.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.012469 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 00:55:54.013505 systemd[1]: Stopped ignition-mount.service. May 15 00:55:54.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.015580 systemd[1]: Stopped target network.target. May 15 00:55:54.017288 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 00:55:54.017329 systemd[1]: Closed iscsiuio.socket. May 15 00:55:54.019813 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 00:55:54.019855 systemd[1]: Stopped ignition-disks.service. May 15 00:55:54.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.022670 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 00:55:54.022711 systemd[1]: Stopped ignition-kargs.service. May 15 00:55:54.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.025518 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 00:55:54.025569 systemd[1]: Stopped ignition-setup.service. May 15 00:55:54.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.028111 systemd[1]: Stopping systemd-networkd.service... May 15 00:55:54.030028 systemd[1]: Stopping systemd-resolved.service... May 15 00:55:54.031936 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 00:55:54.032801 systemd-networkd[718]: eth0: DHCPv6 lease lost May 15 00:55:54.033968 systemd[1]: Finished initrd-cleanup.service. May 15 00:55:54.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.036045 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 00:55:54.037196 systemd[1]: Stopped systemd-networkd.service. May 15 00:55:54.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.040196 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 00:55:54.041277 systemd[1]: Stopped systemd-resolved.service. May 15 00:55:54.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.043000 audit: BPF prog-id=9 op=UNLOAD May 15 00:55:54.044091 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 00:55:54.044115 systemd[1]: Closed systemd-networkd.socket. May 15 00:55:54.045000 audit: BPF prog-id=6 op=UNLOAD May 15 00:55:54.047203 systemd[1]: Stopping network-cleanup.service... May 15 00:55:54.048867 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 00:55:54.048907 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 00:55:54.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.051657 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 00:55:54.051689 systemd[1]: Stopped systemd-sysctl.service. May 15 00:55:54.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.054301 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 00:55:54.054337 systemd[1]: Stopped systemd-modules-load.service. May 15 00:55:54.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.057062 systemd[1]: Stopping systemd-udevd.service... May 15 00:55:54.060192 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 00:55:54.063509 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 00:55:54.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.063656 systemd[1]: Stopped systemd-udevd.service. May 15 00:55:54.065670 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 00:55:54.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.065739 systemd[1]: Stopped network-cleanup.service. May 15 00:55:54.067475 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 00:55:54.067514 systemd[1]: Closed systemd-udevd-control.socket. May 15 00:55:54.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.069106 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 00:55:54.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.069131 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 00:55:54.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.070822 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 00:55:54.070856 systemd[1]: Stopped dracut-pre-udev.service. May 15 00:55:54.072663 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 00:55:54.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.072692 systemd[1]: Stopped dracut-cmdline.service. May 15 00:55:54.074334 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 00:55:54.074364 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 00:55:54.076013 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 00:55:54.077270 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 00:55:54.077321 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 00:55:54.080931 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 00:55:54.081023 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 00:55:54.094428 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 00:55:54.094540 systemd[1]: Stopped sysroot-boot.service. May 15 00:55:54.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.096681 systemd[1]: Reached target initrd-switch-root.target. May 15 00:55:54.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:54.098407 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 00:55:54.098444 systemd[1]: Stopped initrd-setup-root.service. May 15 00:55:54.100059 systemd[1]: Starting initrd-switch-root.service... May 15 00:55:54.117211 systemd[1]: Switching root. May 15 00:55:54.135472 iscsid[725]: iscsid shutting down. May 15 00:55:54.136346 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 15 00:55:54.136389 systemd-journald[197]: Journal stopped May 15 00:55:56.652869 kernel: SELinux: Class mctp_socket not defined in policy. May 15 00:55:56.652929 kernel: SELinux: Class anon_inode not defined in policy. May 15 00:55:56.652944 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 00:55:56.652957 kernel: SELinux: policy capability network_peer_controls=1 May 15 00:55:56.652971 kernel: SELinux: policy capability open_perms=1 May 15 00:55:56.652984 kernel: SELinux: policy capability extended_socket_class=1 May 15 00:55:56.653001 kernel: SELinux: policy capability always_check_network=0 May 15 00:55:56.653014 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 00:55:56.653027 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 00:55:56.653039 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 00:55:56.653052 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 00:55:56.653067 systemd[1]: Successfully loaded SELinux policy in 40.073ms. May 15 00:55:56.653092 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.734ms. May 15 00:55:56.653110 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:55:56.653125 systemd[1]: Detected virtualization kvm. May 15 00:55:56.653139 systemd[1]: Detected architecture x86-64. May 15 00:55:56.653151 systemd[1]: Detected first boot. May 15 00:55:56.653165 systemd[1]: Initializing machine ID from VM UUID. May 15 00:55:56.653180 kernel: kauditd_printk_skb: 65 callbacks suppressed May 15 00:55:56.653199 kernel: audit: type=1400 audit(1747270554.404:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:55:56.653216 kernel: audit: type=1400 audit(1747270554.404:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:55:56.653229 kernel: audit: type=1334 audit(1747270554.408:78): prog-id=10 op=LOAD May 15 00:55:56.653242 kernel: audit: type=1334 audit(1747270554.408:79): prog-id=10 op=UNLOAD May 15 00:55:56.653255 kernel: audit: type=1334 audit(1747270554.411:80): prog-id=11 op=LOAD May 15 00:55:56.653267 kernel: audit: type=1334 audit(1747270554.411:81): prog-id=11 op=UNLOAD May 15 00:55:56.653280 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 00:55:56.653295 kernel: audit: type=1400 audit(1747270554.443:82): avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:55:56.653309 kernel: audit: type=1300 audit(1747270554.443:82): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:56.653326 kernel: audit: type=1327 audit(1747270554.443:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:55:56.653341 kernel: audit: type=1400 audit(1747270554.445:83): avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:55:56.653355 systemd[1]: Populated /etc with preset unit settings. May 15 00:55:56.653371 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:55:56.653385 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:55:56.653403 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:55:56.653421 systemd[1]: iscsid.service: Deactivated successfully. May 15 00:55:56.653435 systemd[1]: Stopped iscsid.service. May 15 00:55:56.653455 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 00:55:56.653469 systemd[1]: Stopped initrd-switch-root.service. May 15 00:55:56.653494 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 00:55:56.653514 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 00:55:56.653529 systemd[1]: Created slice system-addon\x2drun.slice. May 15 00:55:56.653543 systemd[1]: Created slice system-getty.slice. May 15 00:55:56.653558 systemd[1]: Created slice system-modprobe.slice. May 15 00:55:56.653572 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 00:55:56.653587 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 00:55:56.653601 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 00:55:56.653616 systemd[1]: Created slice user.slice. May 15 00:55:56.653630 systemd[1]: Started systemd-ask-password-console.path. May 15 00:55:56.653644 systemd[1]: Started systemd-ask-password-wall.path. May 15 00:55:56.653658 systemd[1]: Set up automount boot.automount. May 15 00:55:56.653672 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 00:55:56.653686 systemd[1]: Stopped target initrd-switch-root.target. May 15 00:55:56.653700 systemd[1]: Stopped target initrd-fs.target. May 15 00:55:56.653713 systemd[1]: Stopped target initrd-root-fs.target. May 15 00:55:56.653727 systemd[1]: Reached target integritysetup.target. May 15 00:55:56.653744 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:55:56.653758 systemd[1]: Reached target remote-fs.target. May 15 00:55:56.653797 systemd[1]: Reached target slices.target. May 15 00:55:56.653811 systemd[1]: Reached target swap.target. May 15 00:55:56.653830 systemd[1]: Reached target torcx.target. May 15 00:55:56.653847 systemd[1]: Reached target veritysetup.target. May 15 00:55:56.653862 systemd[1]: Listening on systemd-coredump.socket. May 15 00:55:56.653877 systemd[1]: Listening on systemd-initctl.socket. May 15 00:55:56.653891 systemd[1]: Listening on systemd-networkd.socket. May 15 00:55:56.653906 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:55:56.653924 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:55:56.653939 systemd[1]: Listening on systemd-userdbd.socket. May 15 00:55:56.653954 systemd[1]: Mounting dev-hugepages.mount... May 15 00:55:56.653969 systemd[1]: Mounting dev-mqueue.mount... May 15 00:55:56.653983 systemd[1]: Mounting media.mount... May 15 00:55:56.653998 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:56.654013 systemd[1]: Mounting sys-kernel-debug.mount... May 15 00:55:56.654027 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 00:55:56.654042 systemd[1]: Mounting tmp.mount... May 15 00:55:56.654059 systemd[1]: Starting flatcar-tmpfiles.service... May 15 00:55:56.654074 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:55:56.654090 systemd[1]: Starting kmod-static-nodes.service... May 15 00:55:56.654104 systemd[1]: Starting modprobe@configfs.service... May 15 00:55:56.654119 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:55:56.654134 systemd[1]: Starting modprobe@drm.service... May 15 00:55:56.654149 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:55:56.654165 systemd[1]: Starting modprobe@fuse.service... May 15 00:55:56.654179 systemd[1]: Starting modprobe@loop.service... May 15 00:55:56.654197 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 00:55:56.654212 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 00:55:56.654227 systemd[1]: Stopped systemd-fsck-root.service. May 15 00:55:56.654241 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 00:55:56.654256 systemd[1]: Stopped systemd-fsck-usr.service. May 15 00:55:56.654270 kernel: fuse: init (API version 7.34) May 15 00:55:56.654284 kernel: loop: module loaded May 15 00:55:56.654297 systemd[1]: Stopped systemd-journald.service. May 15 00:55:56.654312 systemd[1]: Starting systemd-journald.service... May 15 00:55:56.654330 systemd[1]: Starting systemd-modules-load.service... May 15 00:55:56.654344 systemd[1]: Starting systemd-network-generator.service... May 15 00:55:56.654359 systemd[1]: Starting systemd-remount-fs.service... May 15 00:55:56.654374 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:55:56.654389 systemd[1]: verity-setup.service: Deactivated successfully. May 15 00:55:56.654403 systemd[1]: Stopped verity-setup.service. May 15 00:55:56.654418 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:56.654435 systemd-journald[993]: Journal started May 15 00:55:56.654495 systemd-journald[993]: Runtime Journal (/run/log/journal/3a183f5a5e6e4eeabf62266b00c3f4b6) is 6.0M, max 48.4M, 42.4M free. May 15 00:55:56.654533 systemd[1]: Mounted dev-hugepages.mount. May 15 00:55:54.194000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 00:55:54.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:55:54.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:55:54.408000 audit: BPF prog-id=10 op=LOAD May 15 00:55:54.408000 audit: BPF prog-id=10 op=UNLOAD May 15 00:55:54.411000 audit: BPF prog-id=11 op=LOAD May 15 00:55:54.411000 audit: BPF prog-id=11 op=UNLOAD May 15 00:55:54.443000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:55:54.443000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:54.443000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:55:54.445000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:55:54.445000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:54.445000 audit: CWD cwd="/" May 15 00:55:54.445000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:54.445000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:54.445000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:55:56.515000 audit: BPF prog-id=12 op=LOAD May 15 00:55:56.515000 audit: BPF prog-id=3 op=UNLOAD May 15 00:55:56.515000 audit: BPF prog-id=13 op=LOAD May 15 00:55:56.515000 audit: BPF prog-id=14 op=LOAD May 15 00:55:56.515000 audit: BPF prog-id=4 op=UNLOAD May 15 00:55:56.515000 audit: BPF prog-id=5 op=UNLOAD May 15 00:55:56.516000 audit: BPF prog-id=15 op=LOAD May 15 00:55:56.516000 audit: BPF prog-id=12 op=UNLOAD May 15 00:55:56.516000 audit: BPF prog-id=16 op=LOAD May 15 00:55:56.516000 audit: BPF prog-id=17 op=LOAD May 15 00:55:56.516000 audit: BPF prog-id=13 op=UNLOAD May 15 00:55:56.516000 audit: BPF prog-id=14 op=UNLOAD May 15 00:55:56.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.531000 audit: BPF prog-id=15 op=UNLOAD May 15 00:55:56.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.631000 audit: BPF prog-id=18 op=LOAD May 15 00:55:56.631000 audit: BPF prog-id=19 op=LOAD May 15 00:55:56.631000 audit: BPF prog-id=20 op=LOAD May 15 00:55:56.631000 audit: BPF prog-id=16 op=UNLOAD May 15 00:55:56.631000 audit: BPF prog-id=17 op=UNLOAD May 15 00:55:56.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.650000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 00:55:56.650000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffef61dceb0 a2=4000 a3=7ffef61dcf4c items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:56.650000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 00:55:54.442921 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:55:56.514339 systemd[1]: Queued start job for default target multi-user.target. May 15 00:55:54.443151 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:55:56.514352 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 00:55:54.443167 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:55:56.517849 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 00:55:54.443193 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 00:55:54.443201 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 00:55:54.443228 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 00:55:54.443239 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 00:55:54.443405 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 00:55:54.443436 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:55:54.443448 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:55:54.443800 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 00:55:54.443832 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 00:55:54.443848 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 00:55:54.443861 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 00:55:54.443876 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 00:55:54.443888 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 00:55:56.222745 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:55:56.223012 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:55:56.223094 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:55:56.223239 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:55:56.223283 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 00:55:56.223332 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-05-15T00:55:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 00:55:56.658425 systemd[1]: Started systemd-journald.service. May 15 00:55:56.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.658972 systemd[1]: Mounted dev-mqueue.mount. May 15 00:55:56.659845 systemd[1]: Mounted media.mount. May 15 00:55:56.660646 systemd[1]: Mounted sys-kernel-debug.mount. May 15 00:55:56.661582 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 00:55:56.662532 systemd[1]: Mounted tmp.mount. May 15 00:55:56.663470 systemd[1]: Finished flatcar-tmpfiles.service. May 15 00:55:56.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.664593 systemd[1]: Finished kmod-static-nodes.service. May 15 00:55:56.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.665690 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 00:55:56.665853 systemd[1]: Finished modprobe@configfs.service. May 15 00:55:56.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.666974 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:55:56.667121 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:55:56.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.668211 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:55:56.668347 systemd[1]: Finished modprobe@drm.service. May 15 00:55:56.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.669397 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:55:56.669546 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:55:56.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.670696 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 00:55:56.670843 systemd[1]: Finished modprobe@fuse.service. May 15 00:55:56.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.671898 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:55:56.672031 systemd[1]: Finished modprobe@loop.service. May 15 00:55:56.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.673131 systemd[1]: Finished systemd-modules-load.service. May 15 00:55:56.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.674420 systemd[1]: Finished systemd-network-generator.service. May 15 00:55:56.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.675619 systemd[1]: Finished systemd-remount-fs.service. May 15 00:55:56.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.676895 systemd[1]: Reached target network-pre.target. May 15 00:55:56.678696 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 00:55:56.680690 systemd[1]: Mounting sys-kernel-config.mount... May 15 00:55:56.681661 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 00:55:56.682682 systemd[1]: Starting systemd-hwdb-update.service... May 15 00:55:56.684519 systemd[1]: Starting systemd-journal-flush.service... May 15 00:55:56.685796 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:55:56.686876 systemd[1]: Starting systemd-random-seed.service... May 15 00:55:56.688008 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:55:56.689132 systemd-journald[993]: Time spent on flushing to /var/log/journal/3a183f5a5e6e4eeabf62266b00c3f4b6 is 15.474ms for 1158 entries. May 15 00:55:56.689132 systemd-journald[993]: System Journal (/var/log/journal/3a183f5a5e6e4eeabf62266b00c3f4b6) is 8.0M, max 195.6M, 187.6M free. May 15 00:55:56.780912 systemd-journald[993]: Received client request to flush runtime journal. May 15 00:55:56.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:56.691029 systemd[1]: Starting systemd-sysctl.service... May 15 00:55:56.693227 systemd[1]: Starting systemd-sysusers.service... May 15 00:55:56.696088 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:55:56.707442 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 00:55:56.781747 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 00:55:56.708458 systemd[1]: Mounted sys-kernel-config.mount. May 15 00:55:56.710085 systemd[1]: Starting systemd-udev-settle.service... May 15 00:55:56.731239 systemd[1]: Finished systemd-sysctl.service. May 15 00:55:56.734586 systemd[1]: Finished systemd-sysusers.service. May 15 00:55:56.761310 systemd[1]: Finished systemd-random-seed.service. May 15 00:55:56.762433 systemd[1]: Reached target first-boot-complete.target. May 15 00:55:56.781603 systemd[1]: Finished systemd-journal-flush.service. May 15 00:55:56.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.113081 systemd[1]: Finished systemd-hwdb-update.service. May 15 00:55:57.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.113000 audit: BPF prog-id=21 op=LOAD May 15 00:55:57.113000 audit: BPF prog-id=22 op=LOAD May 15 00:55:57.113000 audit: BPF prog-id=7 op=UNLOAD May 15 00:55:57.114000 audit: BPF prog-id=8 op=UNLOAD May 15 00:55:57.115230 systemd[1]: Starting systemd-udevd.service... May 15 00:55:57.129510 systemd-udevd[1014]: Using default interface naming scheme 'v252'. May 15 00:55:57.141019 systemd[1]: Started systemd-udevd.service. May 15 00:55:57.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.142000 audit: BPF prog-id=23 op=LOAD May 15 00:55:57.143753 systemd[1]: Starting systemd-networkd.service... May 15 00:55:57.147000 audit: BPF prog-id=24 op=LOAD May 15 00:55:57.147000 audit: BPF prog-id=25 op=LOAD May 15 00:55:57.148751 systemd[1]: Starting systemd-userdbd.service... May 15 00:55:57.147000 audit: BPF prog-id=26 op=LOAD May 15 00:55:57.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.176932 systemd[1]: Started systemd-userdbd.service. May 15 00:55:57.178324 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 00:55:57.193771 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:55:57.209786 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 00:55:57.211808 systemd-networkd[1018]: lo: Link UP May 15 00:55:57.212022 systemd-networkd[1018]: lo: Gained carrier May 15 00:55:57.212427 systemd-networkd[1018]: Enumeration completed May 15 00:55:57.212570 systemd[1]: Started systemd-networkd.service. May 15 00:55:57.212791 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:55:57.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.214187 systemd-networkd[1018]: eth0: Link UP May 15 00:55:57.214194 systemd-networkd[1018]: eth0: Gained carrier May 15 00:55:57.214785 kernel: ACPI: button: Power Button [PWRF] May 15 00:55:57.227914 systemd-networkd[1018]: eth0: DHCPv4 address 10.0.0.118/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:55:57.225000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 00:55:57.225000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f8612d420 a1=338ac a2=7f031c1c5bc5 a3=5 items=110 ppid=1014 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:57.225000 audit: CWD cwd="/" May 15 00:55:57.225000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=1 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=2 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=3 name=(null) inode=14689 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=4 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=5 name=(null) inode=14690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=6 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=7 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=8 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=9 name=(null) inode=14692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=10 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=11 name=(null) inode=14693 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=12 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=13 name=(null) inode=14694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=14 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=15 name=(null) inode=14695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=16 name=(null) inode=14691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=17 name=(null) inode=14696 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=18 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=19 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=20 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=21 name=(null) inode=14698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=22 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=23 name=(null) inode=14699 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=24 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=25 name=(null) inode=14700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=26 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=27 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=28 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=29 name=(null) inode=14702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=30 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=31 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=32 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=33 name=(null) inode=14704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=34 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=35 name=(null) inode=14705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=36 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=37 name=(null) inode=14706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=38 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=39 name=(null) inode=14707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=40 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=41 name=(null) inode=14708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=42 name=(null) inode=14688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=43 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=44 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=45 name=(null) inode=14710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=46 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=47 name=(null) inode=14711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=48 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=49 name=(null) inode=14712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=50 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=51 name=(null) inode=14713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=52 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=53 name=(null) inode=14714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=55 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=56 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=57 name=(null) inode=14716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=58 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=59 name=(null) inode=14717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=60 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=61 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=62 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=63 name=(null) inode=14719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=64 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=65 name=(null) inode=14720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=66 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=67 name=(null) inode=14721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=68 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=69 name=(null) inode=14722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=70 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=71 name=(null) inode=14723 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=72 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=73 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=74 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=75 name=(null) inode=14725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=76 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=77 name=(null) inode=14726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=78 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=79 name=(null) inode=14727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=80 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=81 name=(null) inode=14728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=82 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=83 name=(null) inode=14729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=84 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=85 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=86 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=87 name=(null) inode=14731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=88 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=89 name=(null) inode=14732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=90 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=91 name=(null) inode=14733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=92 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=93 name=(null) inode=14734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=94 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=95 name=(null) inode=14735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=96 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=97 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=98 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=99 name=(null) inode=14737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=100 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=101 name=(null) inode=14738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=102 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=103 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=104 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=105 name=(null) inode=14740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=106 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=107 name=(null) inode=14741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PATH item=109 name=(null) inode=14742 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:55:57.225000 audit: PROCTITLE proctitle="(udev-worker)" May 15 00:55:57.260856 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 15 00:55:57.278029 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 00:55:57.278150 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 00:55:57.278165 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 00:55:57.278271 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 00:55:57.278351 kernel: mousedev: PS/2 mouse device common for all mice May 15 00:55:57.308164 kernel: kvm: Nested Virtualization enabled May 15 00:55:57.308238 kernel: SVM: kvm: Nested Paging enabled May 15 00:55:57.308252 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 00:55:57.308859 kernel: SVM: Virtual GIF supported May 15 00:55:57.322780 kernel: EDAC MC: Ver: 3.0.0 May 15 00:55:57.346061 systemd[1]: Finished systemd-udev-settle.service. May 15 00:55:57.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.347831 systemd[1]: Starting lvm2-activation-early.service... May 15 00:55:57.355267 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:55:57.378449 systemd[1]: Finished lvm2-activation-early.service. May 15 00:55:57.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.379508 systemd[1]: Reached target cryptsetup.target. May 15 00:55:57.381222 systemd[1]: Starting lvm2-activation.service... May 15 00:55:57.384877 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:55:57.410498 systemd[1]: Finished lvm2-activation.service. May 15 00:55:57.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.411451 systemd[1]: Reached target local-fs-pre.target. May 15 00:55:57.412303 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 00:55:57.412324 systemd[1]: Reached target local-fs.target. May 15 00:55:57.413133 systemd[1]: Reached target machines.target. May 15 00:55:57.414816 systemd[1]: Starting ldconfig.service... May 15 00:55:57.415703 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:55:57.415750 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:57.416402 systemd[1]: Starting systemd-boot-update.service... May 15 00:55:57.417965 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 00:55:57.420527 systemd[1]: Starting systemd-machine-id-commit.service... May 15 00:55:57.422531 systemd[1]: Starting systemd-sysext.service... May 15 00:55:57.422845 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) May 15 00:55:57.423583 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 00:55:57.430128 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 00:55:57.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.433370 systemd[1]: Unmounting usr-share-oem.mount... May 15 00:55:57.437013 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 00:55:57.437133 systemd[1]: Unmounted usr-share-oem.mount. May 15 00:55:57.445784 kernel: loop0: detected capacity change from 0 to 218376 May 15 00:55:57.460959 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) May 15 00:55:57.460959 systemd-fsck[1061]: /dev/vda1: 791 files, 120710/258078 clusters May 15 00:55:57.462360 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 00:55:57.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.465745 systemd[1]: Mounting boot.mount... May 15 00:55:57.480395 systemd[1]: Mounted boot.mount. May 15 00:55:57.647781 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 00:55:57.651156 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 00:55:57.651707 systemd[1]: Finished systemd-boot-update.service. May 15 00:55:57.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.653257 systemd[1]: Finished systemd-machine-id-commit.service. May 15 00:55:57.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.665793 kernel: loop1: detected capacity change from 0 to 218376 May 15 00:55:57.669094 (sd-sysext)[1066]: Using extensions 'kubernetes'. May 15 00:55:57.669438 (sd-sysext)[1066]: Merged extensions into '/usr'. May 15 00:55:57.684453 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.685896 systemd[1]: Mounting usr-share-oem.mount... May 15 00:55:57.686873 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:55:57.688013 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:55:57.690280 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:55:57.692121 systemd[1]: Starting modprobe@loop.service... May 15 00:55:57.692973 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:55:57.693110 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:57.693159 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 00:55:57.693244 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.695748 systemd[1]: Mounted usr-share-oem.mount. May 15 00:55:57.696893 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:55:57.696990 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:55:57.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.698279 systemd[1]: Finished ldconfig.service. May 15 00:55:57.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.699405 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:55:57.699531 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:55:57.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.700893 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:55:57.701011 systemd[1]: Finished modprobe@loop.service. May 15 00:55:57.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.702294 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:55:57.702380 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:55:57.703087 systemd[1]: Finished systemd-sysext.service. May 15 00:55:57.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.704688 systemd[1]: Starting ensure-sysext.service... May 15 00:55:57.706039 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 00:55:57.710998 systemd[1]: Reloading. May 15 00:55:57.714994 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 00:55:57.716607 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 00:55:57.719374 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 00:55:57.753632 /usr/lib/systemd/system-generators/torcx-generator[1092]: time="2025-05-15T00:55:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:55:57.754012 /usr/lib/systemd/system-generators/torcx-generator[1092]: time="2025-05-15T00:55:57Z" level=info msg="torcx already run" May 15 00:55:57.810671 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:55:57.810686 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:55:57.827046 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:55:57.875000 audit: BPF prog-id=27 op=LOAD May 15 00:55:57.875000 audit: BPF prog-id=18 op=UNLOAD May 15 00:55:57.875000 audit: BPF prog-id=28 op=LOAD May 15 00:55:57.875000 audit: BPF prog-id=29 op=LOAD May 15 00:55:57.875000 audit: BPF prog-id=19 op=UNLOAD May 15 00:55:57.875000 audit: BPF prog-id=20 op=UNLOAD May 15 00:55:57.876000 audit: BPF prog-id=30 op=LOAD May 15 00:55:57.876000 audit: BPF prog-id=31 op=LOAD May 15 00:55:57.876000 audit: BPF prog-id=21 op=UNLOAD May 15 00:55:57.876000 audit: BPF prog-id=22 op=UNLOAD May 15 00:55:57.876000 audit: BPF prog-id=32 op=LOAD May 15 00:55:57.876000 audit: BPF prog-id=23 op=UNLOAD May 15 00:55:57.877000 audit: BPF prog-id=33 op=LOAD May 15 00:55:57.877000 audit: BPF prog-id=24 op=UNLOAD May 15 00:55:57.877000 audit: BPF prog-id=34 op=LOAD May 15 00:55:57.877000 audit: BPF prog-id=35 op=LOAD May 15 00:55:57.877000 audit: BPF prog-id=25 op=UNLOAD May 15 00:55:57.877000 audit: BPF prog-id=26 op=UNLOAD May 15 00:55:57.881553 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 00:55:57.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.885431 systemd[1]: Starting audit-rules.service... May 15 00:55:57.887012 systemd[1]: Starting clean-ca-certificates.service... May 15 00:55:57.889472 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 00:55:57.890000 audit: BPF prog-id=36 op=LOAD May 15 00:55:57.892279 systemd[1]: Starting systemd-resolved.service... May 15 00:55:57.893000 audit: BPF prog-id=37 op=LOAD May 15 00:55:57.894650 systemd[1]: Starting systemd-timesyncd.service... May 15 00:55:57.896577 systemd[1]: Starting systemd-update-utmp.service... May 15 00:55:57.898135 systemd[1]: Finished clean-ca-certificates.service. May 15 00:55:57.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.899000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 00:55:57.906207 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.906485 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:55:57.908212 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:55:57.910205 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:55:57.912118 systemd[1]: Starting modprobe@loop.service... May 15 00:55:57.913172 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:55:57.913311 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:57.913436 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:55:57.913546 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.914975 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 00:55:57.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.916536 systemd[1]: Finished systemd-update-utmp.service. May 15 00:55:57.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.917747 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:55:57.917925 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:55:57.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.919095 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:55:57.919209 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:55:57.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.920378 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:55:57.920495 systemd[1]: Finished modprobe@loop.service. May 15 00:55:57.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.922333 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:55:57.922434 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:55:57.923730 systemd[1]: Starting systemd-update-done.service... May 15 00:55:57.925930 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.926090 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:55:57.927028 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:55:57.928652 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:55:57.930306 systemd[1]: Starting modprobe@loop.service... May 15 00:55:57.931047 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:55:57.931207 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:57.931307 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:55:57.931387 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.932268 systemd[1]: Finished systemd-update-done.service. May 15 00:55:57.933341 augenrules[1160]: No rules May 15 00:55:57.933430 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:55:57.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:55:57.932000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 00:55:57.932000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4a261c30 a2=420 a3=0 items=0 ppid=1135 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:55:57.932000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 00:55:57.933534 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:55:57.934626 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:55:57.934725 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:55:57.935872 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:55:57.935963 systemd[1]: Finished modprobe@loop.service. May 15 00:55:57.937084 systemd[1]: Finished audit-rules.service. May 15 00:55:57.938074 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:55:57.938157 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:55:57.940215 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.940397 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:55:57.941284 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:55:57.943311 systemd[1]: Starting modprobe@drm.service... May 15 00:55:57.944934 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:55:57.946667 systemd[1]: Starting modprobe@loop.service... May 15 00:55:57.947526 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:55:57.947636 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:57.948620 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 00:55:57.949707 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:55:57.949812 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:55:57.950772 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:55:57.950876 systemd[1]: Finished modprobe@drm.service. May 15 00:55:57.952027 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:55:57.952117 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:55:57.953299 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:55:57.953391 systemd[1]: Finished modprobe@loop.service. May 15 00:55:57.954794 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:55:57.955356 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:55:57.955478 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:55:57.957446 systemd[1]: Finished ensure-sysext.service. May 15 00:55:57.959103 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:55:57.970004 systemd-resolved[1144]: Positive Trust Anchors: May 15 00:55:57.970017 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:55:57.970042 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:55:57.970785 systemd[1]: Started systemd-timesyncd.service. May 15 00:55:57.971980 systemd[1]: Reached target time-set.target. May 15 00:55:57.973135 systemd-timesyncd[1145]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 00:55:57.973187 systemd-timesyncd[1145]: Initial clock synchronization to Thu 2025-05-15 00:55:58.117967 UTC. May 15 00:55:57.978617 systemd-resolved[1144]: Defaulting to hostname 'linux'. May 15 00:55:57.980007 systemd[1]: Started systemd-resolved.service. May 15 00:55:57.981130 systemd[1]: Reached target network.target. May 15 00:55:57.982088 systemd[1]: Reached target nss-lookup.target. May 15 00:55:57.983061 systemd[1]: Reached target sysinit.target. May 15 00:55:57.984029 systemd[1]: Started motdgen.path. May 15 00:55:57.984835 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 00:55:57.986190 systemd[1]: Started logrotate.timer. May 15 00:55:57.987080 systemd[1]: Started mdadm.timer. May 15 00:55:57.987852 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 00:55:57.988817 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 00:55:57.988844 systemd[1]: Reached target paths.target. May 15 00:55:57.989681 systemd[1]: Reached target timers.target. May 15 00:55:57.990791 systemd[1]: Listening on dbus.socket. May 15 00:55:57.992582 systemd[1]: Starting docker.socket... May 15 00:55:57.995248 systemd[1]: Listening on sshd.socket. May 15 00:55:57.996084 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:57.996389 systemd[1]: Listening on docker.socket. May 15 00:55:57.997158 systemd[1]: Reached target sockets.target. May 15 00:55:57.997924 systemd[1]: Reached target basic.target. May 15 00:55:57.998675 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:55:57.998693 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:55:57.999330 systemd[1]: Starting containerd.service... May 15 00:55:58.000691 systemd[1]: Starting dbus.service... May 15 00:55:58.002119 systemd[1]: Starting enable-oem-cloudinit.service... May 15 00:55:58.003749 systemd[1]: Starting extend-filesystems.service... May 15 00:55:58.004756 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 00:55:58.005605 systemd[1]: Starting motdgen.service... May 15 00:55:58.007472 systemd[1]: Starting prepare-helm.service... May 15 00:55:58.008871 jq[1178]: false May 15 00:55:58.009037 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 00:55:58.010647 systemd[1]: Starting sshd-keygen.service... May 15 00:55:58.013233 systemd[1]: Starting systemd-logind.service... May 15 00:55:58.014103 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:55:58.014152 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 00:55:58.014459 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 00:55:58.014995 systemd[1]: Starting update-engine.service... May 15 00:55:58.016659 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 00:55:58.019201 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 00:55:58.019341 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 00:55:58.020268 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 00:55:58.020398 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 00:55:58.024156 jq[1192]: true May 15 00:55:58.027839 tar[1195]: linux-amd64/LICENSE May 15 00:55:58.027839 tar[1195]: linux-amd64/helm May 15 00:55:58.028350 jq[1200]: true May 15 00:55:58.033476 extend-filesystems[1179]: Found loop1 May 15 00:55:58.034680 extend-filesystems[1179]: Found sr0 May 15 00:55:58.034680 extend-filesystems[1179]: Found vda May 15 00:55:58.034680 extend-filesystems[1179]: Found vda1 May 15 00:55:58.034680 extend-filesystems[1179]: Found vda2 May 15 00:55:58.037285 extend-filesystems[1179]: Found vda3 May 15 00:55:58.037285 extend-filesystems[1179]: Found usr May 15 00:55:58.037285 extend-filesystems[1179]: Found vda4 May 15 00:55:58.037224 systemd[1]: Started dbus.service. May 15 00:55:58.037078 dbus-daemon[1177]: [system] SELinux support is enabled May 15 00:55:58.039235 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 00:55:58.039255 systemd[1]: Reached target system-config.target. May 15 00:55:58.039690 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 00:55:58.039704 systemd[1]: Reached target user-config.target. May 15 00:55:58.043465 extend-filesystems[1179]: Found vda6 May 15 00:55:58.043701 systemd[1]: motdgen.service: Deactivated successfully. May 15 00:55:58.043856 systemd[1]: Finished motdgen.service. May 15 00:55:58.051575 extend-filesystems[1179]: Found vda7 May 15 00:55:58.052602 extend-filesystems[1179]: Found vda9 May 15 00:55:58.052602 extend-filesystems[1179]: Checking size of /dev/vda9 May 15 00:55:58.055033 update_engine[1189]: I0515 00:55:58.054914 1189 main.cc:92] Flatcar Update Engine starting May 15 00:55:58.056641 systemd[1]: Started update-engine.service. May 15 00:55:58.056714 update_engine[1189]: I0515 00:55:58.056651 1189 update_check_scheduler.cc:74] Next update check in 3m39s May 15 00:55:58.059101 systemd[1]: Started locksmithd.service. May 15 00:55:58.068444 env[1201]: time="2025-05-15T00:55:58.068392055Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 00:55:58.081481 extend-filesystems[1179]: Resized partition /dev/vda9 May 15 00:55:58.083561 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) May 15 00:55:58.085698 systemd-logind[1187]: Watching system buttons on /dev/input/event1 (Power Button) May 15 00:55:58.085931 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 00:55:58.086938 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 00:55:58.088357 systemd-logind[1187]: New seat seat0. May 15 00:55:58.092164 systemd[1]: Started systemd-logind.service. May 15 00:55:58.112808 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 00:55:58.113097 env[1201]: time="2025-05-15T00:55:58.113051443Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 00:55:58.137372 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 00:55:58.137372 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 00:55:58.137372 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 00:55:58.139448 locksmithd[1217]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 00:55:58.141443 extend-filesystems[1179]: Resized filesystem in /dev/vda9 May 15 00:55:58.142746 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 00:55:58.142898 systemd[1]: Finished extend-filesystems.service. May 15 00:55:58.144207 env[1201]: time="2025-05-15T00:55:58.143961822Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 00:55:58.145920 env[1201]: time="2025-05-15T00:55:58.145873617Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 00:55:58.145920 env[1201]: time="2025-05-15T00:55:58.145914673Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 00:55:58.147935 env[1201]: time="2025-05-15T00:55:58.147906397Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:55:58.147935 env[1201]: time="2025-05-15T00:55:58.147929347Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 00:55:58.147996 env[1201]: time="2025-05-15T00:55:58.147943608Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 00:55:58.147996 env[1201]: time="2025-05-15T00:55:58.147953675Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 00:55:58.148039 bash[1232]: Updated "/home/core/.ssh/authorized_keys" May 15 00:55:58.148172 env[1201]: time="2025-05-15T00:55:58.148048109Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 00:55:58.148284 env[1201]: time="2025-05-15T00:55:58.148258949Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 00:55:58.148408 env[1201]: time="2025-05-15T00:55:58.148383861Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:55:58.148408 env[1201]: time="2025-05-15T00:55:58.148402293Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 00:55:58.148453 env[1201]: time="2025-05-15T00:55:58.148445175Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 00:55:58.148480 env[1201]: time="2025-05-15T00:55:58.148456222Z" level=info msg="metadata content store policy set" policy=shared May 15 00:55:58.149082 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 00:55:58.155782 env[1201]: time="2025-05-15T00:55:58.155741934Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 00:55:58.155835 env[1201]: time="2025-05-15T00:55:58.155795475Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 00:55:58.155835 env[1201]: time="2025-05-15T00:55:58.155815743Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 00:55:58.155877 env[1201]: time="2025-05-15T00:55:58.155849517Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 00:55:58.155877 env[1201]: time="2025-05-15T00:55:58.155869070Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 00:55:58.155918 env[1201]: time="2025-05-15T00:55:58.155886859Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 00:55:58.155918 env[1201]: time="2025-05-15T00:55:58.155903679Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 00:55:58.155958 env[1201]: time="2025-05-15T00:55:58.155920020Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 00:55:58.155958 env[1201]: time="2025-05-15T00:55:58.155937034Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 00:55:58.155958 env[1201]: time="2025-05-15T00:55:58.155952416Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 00:55:58.156014 env[1201]: time="2025-05-15T00:55:58.155967829Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 00:55:58.156014 env[1201]: time="2025-05-15T00:55:58.155982415Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 00:55:58.156116 env[1201]: time="2025-05-15T00:55:58.156086795Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 00:55:58.156249 env[1201]: time="2025-05-15T00:55:58.156174589Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156473935Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156521367Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156535494Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156580742Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156592891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156605641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156617382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156630611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156642076Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156652104Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156662518Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156676033Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156826609Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156842063Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 00:55:58.157849 env[1201]: time="2025-05-15T00:55:58.156852886Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 00:55:58.158213 env[1201]: time="2025-05-15T00:55:58.156863585Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 00:55:58.158213 env[1201]: time="2025-05-15T00:55:58.156877315Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 00:55:58.158213 env[1201]: time="2025-05-15T00:55:58.156887862Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 00:55:58.158213 env[1201]: time="2025-05-15T00:55:58.156905712Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 00:55:58.158213 env[1201]: time="2025-05-15T00:55:58.156939424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 00:55:58.158015 systemd[1]: Started containerd.service. May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157106056Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157152845Z" level=info msg="Connect containerd service" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157187169Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157692245Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157842526Z" level=info msg="Start subscribing containerd event" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157880684Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157892700Z" level=info msg="Start recovering state" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157911877Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157960196Z" level=info msg="Start event monitor" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.157988358Z" level=info msg="Start snapshots syncer" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.158000650Z" level=info msg="Start cni network conf syncer for default" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.158010023Z" level=info msg="Start streaming server" May 15 00:55:58.158385 env[1201]: time="2025-05-15T00:55:58.158080885Z" level=info msg="containerd successfully booted in 0.090277s" May 15 00:55:58.323979 systemd-networkd[1018]: eth0: Gained IPv6LL May 15 00:55:58.325909 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 00:55:58.327280 systemd[1]: Reached target network-online.target. May 15 00:55:58.329835 systemd[1]: Starting kubelet.service... May 15 00:55:58.445291 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 00:55:58.463639 systemd[1]: Finished sshd-keygen.service. May 15 00:55:58.465994 systemd[1]: Starting issuegen.service... May 15 00:55:58.471137 systemd[1]: issuegen.service: Deactivated successfully. May 15 00:55:58.471266 systemd[1]: Finished issuegen.service. May 15 00:55:58.473367 systemd[1]: Starting systemd-user-sessions.service... May 15 00:55:58.478613 systemd[1]: Finished systemd-user-sessions.service. May 15 00:55:58.480689 systemd[1]: Started getty@tty1.service. May 15 00:55:58.482077 tar[1195]: linux-amd64/README.md May 15 00:55:58.482746 systemd[1]: Started serial-getty@ttyS0.service. May 15 00:55:58.483869 systemd[1]: Reached target getty.target. May 15 00:55:58.488471 systemd[1]: Finished prepare-helm.service. May 15 00:55:58.965752 systemd[1]: Started kubelet.service. May 15 00:55:58.967238 systemd[1]: Reached target multi-user.target. May 15 00:55:58.969251 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 00:55:58.975451 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 00:55:58.975618 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 00:55:58.976749 systemd[1]: Startup finished in 585ms (kernel) + 4.462s (initrd) + 4.824s (userspace) = 9.871s. May 15 00:55:59.364931 kubelet[1259]: E0515 00:55:59.364859 1259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:55:59.366380 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:55:59.366502 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:56:02.105381 systemd[1]: Created slice system-sshd.slice. May 15 00:56:02.106716 systemd[1]: Started sshd@0-10.0.0.118:22-10.0.0.1:47144.service. May 15 00:56:02.153543 sshd[1268]: Accepted publickey for core from 10.0.0.1 port 47144 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.155065 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.164451 systemd-logind[1187]: New session 1 of user core. May 15 00:56:02.165337 systemd[1]: Created slice user-500.slice. May 15 00:56:02.166352 systemd[1]: Starting user-runtime-dir@500.service... May 15 00:56:02.175986 systemd[1]: Finished user-runtime-dir@500.service. May 15 00:56:02.177770 systemd[1]: Starting user@500.service... May 15 00:56:02.180434 (systemd)[1271]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.268563 systemd[1271]: Queued start job for default target default.target. May 15 00:56:02.269014 systemd[1271]: Reached target paths.target. May 15 00:56:02.269037 systemd[1271]: Reached target sockets.target. May 15 00:56:02.269049 systemd[1271]: Reached target timers.target. May 15 00:56:02.269060 systemd[1271]: Reached target basic.target. May 15 00:56:02.269095 systemd[1271]: Reached target default.target. May 15 00:56:02.269115 systemd[1271]: Startup finished in 81ms. May 15 00:56:02.269198 systemd[1]: Started user@500.service. May 15 00:56:02.270171 systemd[1]: Started session-1.scope. May 15 00:56:02.320154 systemd[1]: Started sshd@1-10.0.0.118:22-10.0.0.1:47158.service. May 15 00:56:02.360309 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 47158 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.361204 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.364708 systemd-logind[1187]: New session 2 of user core. May 15 00:56:02.365718 systemd[1]: Started session-2.scope. May 15 00:56:02.418129 sshd[1280]: pam_unix(sshd:session): session closed for user core May 15 00:56:02.420769 systemd[1]: sshd@1-10.0.0.118:22-10.0.0.1:47158.service: Deactivated successfully. May 15 00:56:02.421299 systemd[1]: session-2.scope: Deactivated successfully. May 15 00:56:02.421758 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. May 15 00:56:02.422661 systemd[1]: Started sshd@2-10.0.0.118:22-10.0.0.1:47174.service. May 15 00:56:02.423446 systemd-logind[1187]: Removed session 2. May 15 00:56:02.463067 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 47174 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.464281 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.467406 systemd-logind[1187]: New session 3 of user core. May 15 00:56:02.468138 systemd[1]: Started session-3.scope. May 15 00:56:02.517424 sshd[1286]: pam_unix(sshd:session): session closed for user core May 15 00:56:02.520297 systemd[1]: sshd@2-10.0.0.118:22-10.0.0.1:47174.service: Deactivated successfully. May 15 00:56:02.520815 systemd[1]: session-3.scope: Deactivated successfully. May 15 00:56:02.521300 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. May 15 00:56:02.522221 systemd[1]: Started sshd@3-10.0.0.118:22-10.0.0.1:47186.service. May 15 00:56:02.523185 systemd-logind[1187]: Removed session 3. May 15 00:56:02.564696 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 47186 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.565841 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.569725 systemd-logind[1187]: New session 4 of user core. May 15 00:56:02.570523 systemd[1]: Started session-4.scope. May 15 00:56:02.625402 sshd[1293]: pam_unix(sshd:session): session closed for user core May 15 00:56:02.628329 systemd[1]: Started sshd@4-10.0.0.118:22-10.0.0.1:47196.service. May 15 00:56:02.628771 systemd[1]: sshd@3-10.0.0.118:22-10.0.0.1:47186.service: Deactivated successfully. May 15 00:56:02.629314 systemd[1]: session-4.scope: Deactivated successfully. May 15 00:56:02.629740 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. May 15 00:56:02.630428 systemd-logind[1187]: Removed session 4. May 15 00:56:02.672149 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 47196 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.673463 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.676700 systemd-logind[1187]: New session 5 of user core. May 15 00:56:02.677467 systemd[1]: Started session-5.scope. May 15 00:56:02.733846 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 00:56:02.734035 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:02.743013 dbus-daemon[1177]: \xd0M\u0018@\xfaU: received setenforce notice (enforcing=1116266032) May 15 00:56:02.745014 sudo[1302]: pam_unix(sudo:session): session closed for user root May 15 00:56:02.746700 sshd[1298]: pam_unix(sshd:session): session closed for user core May 15 00:56:02.749854 systemd[1]: sshd@4-10.0.0.118:22-10.0.0.1:47196.service: Deactivated successfully. May 15 00:56:02.750350 systemd[1]: session-5.scope: Deactivated successfully. May 15 00:56:02.750915 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. May 15 00:56:02.751907 systemd[1]: Started sshd@5-10.0.0.118:22-10.0.0.1:47206.service. May 15 00:56:02.752727 systemd-logind[1187]: Removed session 5. May 15 00:56:02.792881 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 47206 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.793973 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.797400 systemd-logind[1187]: New session 6 of user core. May 15 00:56:02.798167 systemd[1]: Started session-6.scope. May 15 00:56:02.851280 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 00:56:02.851522 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:02.853948 sudo[1310]: pam_unix(sudo:session): session closed for user root May 15 00:56:02.858355 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 00:56:02.858555 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:02.866212 systemd[1]: Stopping audit-rules.service... May 15 00:56:02.866000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:56:02.867433 auditctl[1313]: No rules May 15 00:56:02.867802 systemd[1]: audit-rules.service: Deactivated successfully. May 15 00:56:02.867976 systemd[1]: Stopped audit-rules.service. May 15 00:56:02.868196 kernel: kauditd_printk_skb: 234 callbacks suppressed May 15 00:56:02.868236 kernel: audit: type=1305 audit(1747270562.866:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:56:02.866000 audit[1313]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc30cce270 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:02.869348 systemd[1]: Starting audit-rules.service... May 15 00:56:02.874479 kernel: audit: type=1300 audit(1747270562.866:196): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc30cce270 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:02.878065 kernel: audit: type=1327 audit(1747270562.866:196): proctitle=2F7362696E2F617564697463746C002D44 May 15 00:56:02.878133 kernel: audit: type=1131 audit(1747270562.867:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.866000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 00:56:02.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.885653 augenrules[1330]: No rules May 15 00:56:02.886226 systemd[1]: Finished audit-rules.service. May 15 00:56:02.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.886988 sudo[1309]: pam_unix(sudo:session): session closed for user root May 15 00:56:02.888256 sshd[1306]: pam_unix(sshd:session): session closed for user core May 15 00:56:02.885000 audit[1309]: USER_END pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:02.890933 systemd[1]: sshd@5-10.0.0.118:22-10.0.0.1:47206.service: Deactivated successfully. May 15 00:56:02.891364 systemd[1]: session-6.scope: Deactivated successfully. May 15 00:56:02.891966 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. May 15 00:56:02.892897 systemd[1]: Started sshd@6-10.0.0.118:22-10.0.0.1:47216.service. May 15 00:56:02.893733 systemd-logind[1187]: Removed session 6. May 15 00:56:02.894321 kernel: audit: type=1130 audit(1747270562.885:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.894374 kernel: audit: type=1106 audit(1747270562.885:199): pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:02.894397 kernel: audit: type=1104 audit(1747270562.885:200): pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:02.885000 audit[1309]: CRED_DISP pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:02.897688 kernel: audit: type=1106 audit(1747270562.885:201): pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.885000 audit[1306]: USER_END pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.885000 audit[1306]: CRED_DISP pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.905387 kernel: audit: type=1104 audit(1747270562.885:202): pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.905411 kernel: audit: type=1131 audit(1747270562.889:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.118:22-10.0.0.1:47206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.118:22-10.0.0.1:47206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:47216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:02.932000 audit[1336]: USER_ACCT pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.933992 sshd[1336]: Accepted publickey for core from 10.0.0.1 port 47216 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:02.932000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.932000 audit[1336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff88ba2a80 a2=3 a3=0 items=0 ppid=1 pid=1336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:02.932000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:56:02.934895 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:02.938021 systemd-logind[1187]: New session 7 of user core. May 15 00:56:02.938713 systemd[1]: Started session-7.scope. May 15 00:56:02.940000 audit[1336]: USER_START pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.941000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:02.991000 audit[1339]: USER_ACCT pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:02.992219 sudo[1339]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 00:56:02.991000 audit[1339]: CRED_REFR pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:02.992479 sudo[1339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:56:02.993000 audit[1339]: USER_START pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:03.013173 systemd[1]: Starting docker.service... May 15 00:56:03.046393 env[1350]: time="2025-05-15T00:56:03.046323580Z" level=info msg="Starting up" May 15 00:56:03.047432 env[1350]: time="2025-05-15T00:56:03.047401475Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 00:56:03.047432 env[1350]: time="2025-05-15T00:56:03.047419748Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 00:56:03.047512 env[1350]: time="2025-05-15T00:56:03.047438343Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 00:56:03.047512 env[1350]: time="2025-05-15T00:56:03.047447778Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 00:56:03.048820 env[1350]: time="2025-05-15T00:56:03.048793416Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 00:56:03.048820 env[1350]: time="2025-05-15T00:56:03.048807754Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 00:56:03.048820 env[1350]: time="2025-05-15T00:56:03.048817340Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 00:56:03.048914 env[1350]: time="2025-05-15T00:56:03.048826259Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 00:56:04.168885 env[1350]: time="2025-05-15T00:56:04.168829971Z" level=info msg="Loading containers: start." May 15 00:56:04.214000 audit[1384]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.214000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff56261ed0 a2=0 a3=7fff56261ebc items=0 ppid=1350 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 00:56:04.216000 audit[1386]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.216000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffedec00d40 a2=0 a3=7ffedec00d2c items=0 ppid=1350 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.216000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 00:56:04.217000 audit[1388]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.217000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeccf5c910 a2=0 a3=7ffeccf5c8fc items=0 ppid=1350 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 00:56:04.218000 audit[1390]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.218000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff65567b90 a2=0 a3=7fff65567b7c items=0 ppid=1350 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.218000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 00:56:04.220000 audit[1392]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.220000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd34bff260 a2=0 a3=7ffd34bff24c items=0 ppid=1350 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 00:56:04.239000 audit[1397]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.239000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc756619d0 a2=0 a3=7ffc756619bc items=0 ppid=1350 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.239000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 00:56:04.246000 audit[1399]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.246000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd29349c00 a2=0 a3=7ffd29349bec items=0 ppid=1350 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.246000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 00:56:04.247000 audit[1401]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.247000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc7bcb7cb0 a2=0 a3=7ffc7bcb7c9c items=0 ppid=1350 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 00:56:04.248000 audit[1403]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.248000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff50442da0 a2=0 a3=7fff50442d8c items=0 ppid=1350 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:56:04.256000 audit[1407]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.256000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc4316b910 a2=0 a3=7ffc4316b8fc items=0 ppid=1350 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 00:56:04.260000 audit[1408]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.260000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb8fc8810 a2=0 a3=7ffcb8fc87fc items=0 ppid=1350 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.260000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:56:04.269798 kernel: Initializing XFRM netlink socket May 15 00:56:04.297169 env[1350]: time="2025-05-15T00:56:04.297124733Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 00:56:04.310000 audit[1416]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.310000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe84b1feb0 a2=0 a3=7ffe84b1fe9c items=0 ppid=1350 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.310000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 00:56:04.320000 audit[1419]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.320000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdfb3a2d40 a2=0 a3=7ffdfb3a2d2c items=0 ppid=1350 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 00:56:04.322000 audit[1422]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.322000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd5a3ce120 a2=0 a3=7ffd5a3ce10c items=0 ppid=1350 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 00:56:04.324000 audit[1424]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.324000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd1f0bee00 a2=0 a3=7ffd1f0bedec items=0 ppid=1350 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 00:56:04.326000 audit[1426]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.326000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffec50e5220 a2=0 a3=7ffec50e520c items=0 ppid=1350 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 00:56:04.327000 audit[1428]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.327000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdf4ec3e20 a2=0 a3=7ffdf4ec3e0c items=0 ppid=1350 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 00:56:04.329000 audit[1430]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.329000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd52e1d260 a2=0 a3=7ffd52e1d24c items=0 ppid=1350 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 00:56:04.335000 audit[1433]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.335000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe2309c250 a2=0 a3=7ffe2309c23c items=0 ppid=1350 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 00:56:04.337000 audit[1435]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.337000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff544084d0 a2=0 a3=7fff544084bc items=0 ppid=1350 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 00:56:04.338000 audit[1437]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.338000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc046d69c0 a2=0 a3=7ffc046d69ac items=0 ppid=1350 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 00:56:04.340000 audit[1439]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.340000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff3de431a0 a2=0 a3=7fff3de4318c items=0 ppid=1350 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 00:56:04.341334 systemd-networkd[1018]: docker0: Link UP May 15 00:56:04.348000 audit[1443]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.348000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd46187b10 a2=0 a3=7ffd46187afc items=0 ppid=1350 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 00:56:04.352000 audit[1444]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:04.352000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc675a4a50 a2=0 a3=7ffc675a4a3c items=0 ppid=1350 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:04.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:56:04.354071 env[1350]: time="2025-05-15T00:56:04.354035707Z" level=info msg="Loading containers: done." May 15 00:56:04.370136 env[1350]: time="2025-05-15T00:56:04.370074212Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 00:56:04.370292 env[1350]: time="2025-05-15T00:56:04.370264510Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 00:56:04.370379 env[1350]: time="2025-05-15T00:56:04.370354746Z" level=info msg="Daemon has completed initialization" May 15 00:56:04.389654 systemd[1]: Started docker.service. May 15 00:56:04.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:04.397506 env[1350]: time="2025-05-15T00:56:04.397436812Z" level=info msg="API listen on /run/docker.sock" May 15 00:56:05.107273 env[1201]: time="2025-05-15T00:56:05.107228036Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 15 00:56:05.755452 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2754929803.mount: Deactivated successfully. May 15 00:56:07.321683 env[1201]: time="2025-05-15T00:56:07.321611384Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:07.408007 env[1201]: time="2025-05-15T00:56:07.407947113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:07.461584 env[1201]: time="2025-05-15T00:56:07.461525786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:07.477437 env[1201]: time="2025-05-15T00:56:07.477384616Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:07.478158 env[1201]: time="2025-05-15T00:56:07.478102756Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 15 00:56:07.478725 env[1201]: time="2025-05-15T00:56:07.478692501Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 15 00:56:09.172145 env[1201]: time="2025-05-15T00:56:09.172079713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:09.174540 env[1201]: time="2025-05-15T00:56:09.174484622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:09.176466 env[1201]: time="2025-05-15T00:56:09.176433778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:09.179416 env[1201]: time="2025-05-15T00:56:09.179383497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:09.180201 env[1201]: time="2025-05-15T00:56:09.180161883Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 15 00:56:09.180604 env[1201]: time="2025-05-15T00:56:09.180580604Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 15 00:56:09.560244 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 00:56:09.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:09.560441 systemd[1]: Stopped kubelet.service. May 15 00:56:09.561529 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 00:56:09.561662 kernel: audit: type=1130 audit(1747270569.559:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:09.561666 systemd[1]: Starting kubelet.service... May 15 00:56:09.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:09.568810 kernel: audit: type=1131 audit(1747270569.559:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:09.666476 systemd[1]: Started kubelet.service. May 15 00:56:09.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:09.670786 kernel: audit: type=1130 audit(1747270569.665:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:09.707791 kubelet[1485]: E0515 00:56:09.707705 1485 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:56:09.711698 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:56:09.711832 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:56:09.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:56:09.716796 kernel: audit: type=1131 audit(1747270569.711:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:56:11.138741 env[1201]: time="2025-05-15T00:56:11.138677671Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:11.141139 env[1201]: time="2025-05-15T00:56:11.141092340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:11.143197 env[1201]: time="2025-05-15T00:56:11.143163113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:11.145291 env[1201]: time="2025-05-15T00:56:11.145264520Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:11.146215 env[1201]: time="2025-05-15T00:56:11.146165774Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 15 00:56:11.146942 env[1201]: time="2025-05-15T00:56:11.146913462Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 00:56:12.248711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2400264986.mount: Deactivated successfully. May 15 00:56:13.203905 env[1201]: time="2025-05-15T00:56:13.203839039Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:13.206374 env[1201]: time="2025-05-15T00:56:13.206315141Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:13.208168 env[1201]: time="2025-05-15T00:56:13.208131669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:13.209522 env[1201]: time="2025-05-15T00:56:13.209486710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:13.209822 env[1201]: time="2025-05-15T00:56:13.209788089Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 15 00:56:13.210419 env[1201]: time="2025-05-15T00:56:13.210381505Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 15 00:56:13.945483 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3456201769.mount: Deactivated successfully. May 15 00:56:14.866950 env[1201]: time="2025-05-15T00:56:14.866878130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:14.870303 env[1201]: time="2025-05-15T00:56:14.870266946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:14.872476 env[1201]: time="2025-05-15T00:56:14.872453708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:14.874472 env[1201]: time="2025-05-15T00:56:14.874450015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:14.875163 env[1201]: time="2025-05-15T00:56:14.875138182Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 15 00:56:14.875701 env[1201]: time="2025-05-15T00:56:14.875648547Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 00:56:15.584232 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1733235377.mount: Deactivated successfully. May 15 00:56:15.589337 env[1201]: time="2025-05-15T00:56:15.589285719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:15.591074 env[1201]: time="2025-05-15T00:56:15.591036266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:15.592641 env[1201]: time="2025-05-15T00:56:15.592611168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:15.594146 env[1201]: time="2025-05-15T00:56:15.594109302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:15.594534 env[1201]: time="2025-05-15T00:56:15.594502864Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 00:56:15.595078 env[1201]: time="2025-05-15T00:56:15.595056223Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 15 00:56:16.109898 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3758196654.mount: Deactivated successfully. May 15 00:56:18.891017 env[1201]: time="2025-05-15T00:56:18.890958498Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:18.893349 env[1201]: time="2025-05-15T00:56:18.893295033Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:18.895350 env[1201]: time="2025-05-15T00:56:18.895312398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:18.897326 env[1201]: time="2025-05-15T00:56:18.897297495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:18.898253 env[1201]: time="2025-05-15T00:56:18.898219145Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 15 00:56:19.749618 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 00:56:19.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:19.749841 systemd[1]: Stopped kubelet.service. May 15 00:56:19.751141 systemd[1]: Starting kubelet.service... May 15 00:56:19.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:19.756028 kernel: audit: type=1130 audit(1747270579.749:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:19.756086 kernel: audit: type=1131 audit(1747270579.749:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:19.853435 systemd[1]: Started kubelet.service. May 15 00:56:19.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:19.857794 kernel: audit: type=1130 audit(1747270579.853:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:19.894921 kubelet[1519]: E0515 00:56:19.894864 1519 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:56:19.896663 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:56:19.896809 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:56:19.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:56:19.900798 kernel: audit: type=1131 audit(1747270579.895:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:56:21.352443 systemd[1]: Stopped kubelet.service. May 15 00:56:21.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:21.354527 systemd[1]: Starting kubelet.service... May 15 00:56:21.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:21.358943 kernel: audit: type=1130 audit(1747270581.351:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:21.358998 kernel: audit: type=1131 audit(1747270581.351:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:21.378551 systemd[1]: Reloading. May 15 00:56:21.426822 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2025-05-15T00:56:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:56:21.427194 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2025-05-15T00:56:21Z" level=info msg="torcx already run" May 15 00:56:21.877282 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:56:21.877297 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:56:21.893425 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:56:21.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956903 kernel: audit: type=1400 audit(1747270581.948:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956950 kernel: audit: type=1400 audit(1747270581.948:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956972 kernel: audit: type=1400 audit(1747270581.948:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964212 kernel: audit: type=1400 audit(1747270581.948:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit: BPF prog-id=43 op=LOAD May 15 00:56:21.956000 audit: BPF prog-id=27 op=UNLOAD May 15 00:56:21.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit: BPF prog-id=44 op=LOAD May 15 00:56:21.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit: BPF prog-id=45 op=LOAD May 15 00:56:21.963000 audit: BPF prog-id=28 op=UNLOAD May 15 00:56:21.963000 audit: BPF prog-id=29 op=UNLOAD May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit: BPF prog-id=46 op=LOAD May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.963000 audit: BPF prog-id=47 op=LOAD May 15 00:56:21.963000 audit: BPF prog-id=30 op=UNLOAD May 15 00:56:21.963000 audit: BPF prog-id=31 op=UNLOAD May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit: BPF prog-id=48 op=LOAD May 15 00:56:21.964000 audit: BPF prog-id=37 op=UNLOAD May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.964000 audit: BPF prog-id=49 op=LOAD May 15 00:56:21.964000 audit: BPF prog-id=32 op=UNLOAD May 15 00:56:21.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit: BPF prog-id=50 op=LOAD May 15 00:56:21.966000 audit: BPF prog-id=38 op=UNLOAD May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit: BPF prog-id=51 op=LOAD May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit: BPF prog-id=52 op=LOAD May 15 00:56:21.966000 audit: BPF prog-id=39 op=UNLOAD May 15 00:56:21.966000 audit: BPF prog-id=40 op=UNLOAD May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit: BPF prog-id=53 op=LOAD May 15 00:56:21.966000 audit: BPF prog-id=33 op=UNLOAD May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit: BPF prog-id=54 op=LOAD May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit: BPF prog-id=55 op=LOAD May 15 00:56:21.967000 audit: BPF prog-id=34 op=UNLOAD May 15 00:56:21.967000 audit: BPF prog-id=35 op=UNLOAD May 15 00:56:21.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.968000 audit: BPF prog-id=56 op=LOAD May 15 00:56:21.968000 audit: BPF prog-id=36 op=UNLOAD May 15 00:56:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:21.970000 audit: BPF prog-id=57 op=LOAD May 15 00:56:21.970000 audit: BPF prog-id=41 op=UNLOAD May 15 00:56:21.980642 systemd[1]: Started kubelet.service. May 15 00:56:21.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:21.984290 systemd[1]: Stopping kubelet.service... May 15 00:56:21.984746 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:56:21.984938 systemd[1]: Stopped kubelet.service. May 15 00:56:21.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:21.986568 systemd[1]: Starting kubelet.service... May 15 00:56:22.069235 systemd[1]: Started kubelet.service. May 15 00:56:22.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:22.107346 kubelet[1607]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:56:22.107346 kubelet[1607]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 00:56:22.107346 kubelet[1607]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:56:22.107719 kubelet[1607]: I0515 00:56:22.107410 1607 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:56:22.381313 kubelet[1607]: I0515 00:56:22.381266 1607 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 00:56:22.381313 kubelet[1607]: I0515 00:56:22.381305 1607 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:56:22.381603 kubelet[1607]: I0515 00:56:22.381581 1607 server.go:954] "Client rotation is on, will bootstrap in background" May 15 00:56:22.404082 kubelet[1607]: E0515 00:56:22.404046 1607 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:22.405727 kubelet[1607]: I0515 00:56:22.405663 1607 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:56:22.413141 kubelet[1607]: E0515 00:56:22.413097 1607 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 00:56:22.413141 kubelet[1607]: I0515 00:56:22.413142 1607 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 00:56:22.417368 kubelet[1607]: I0515 00:56:22.417346 1607 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:56:22.418476 kubelet[1607]: I0515 00:56:22.418436 1607 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:56:22.418634 kubelet[1607]: I0515 00:56:22.418469 1607 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 00:56:22.418634 kubelet[1607]: I0515 00:56:22.418630 1607 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:56:22.418747 kubelet[1607]: I0515 00:56:22.418638 1607 container_manager_linux.go:304] "Creating device plugin manager" May 15 00:56:22.418747 kubelet[1607]: I0515 00:56:22.418739 1607 state_mem.go:36] "Initialized new in-memory state store" May 15 00:56:22.421653 kubelet[1607]: I0515 00:56:22.421631 1607 kubelet.go:446] "Attempting to sync node with API server" May 15 00:56:22.421653 kubelet[1607]: I0515 00:56:22.421647 1607 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:56:22.421719 kubelet[1607]: I0515 00:56:22.421662 1607 kubelet.go:352] "Adding apiserver pod source" May 15 00:56:22.421719 kubelet[1607]: I0515 00:56:22.421677 1607 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:56:22.447699 kubelet[1607]: I0515 00:56:22.447648 1607 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:56:22.448081 kubelet[1607]: I0515 00:56:22.448059 1607 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:56:22.449233 kubelet[1607]: W0515 00:56:22.449177 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:22.449303 kubelet[1607]: E0515 00:56:22.449256 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:22.453638 kubelet[1607]: W0515 00:56:22.453595 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:22.453700 kubelet[1607]: E0515 00:56:22.453647 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:22.454486 kubelet[1607]: W0515 00:56:22.454461 1607 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 00:56:22.459283 kubelet[1607]: I0515 00:56:22.459249 1607 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 00:56:22.459348 kubelet[1607]: I0515 00:56:22.459291 1607 server.go:1287] "Started kubelet" May 15 00:56:22.460242 kubelet[1607]: I0515 00:56:22.459955 1607 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:56:22.459000 audit[1607]: AVC avc: denied { mac_admin } for pid=1607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:22.459000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:22.459000 audit[1607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005fd020 a1=c000a1a738 a2=c0005fcff0 a3=25 items=0 ppid=1 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:22.459000 audit[1607]: AVC avc: denied { mac_admin } for pid=1607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:22.459000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:22.459000 audit[1607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c36120 a1=c000a1a750 a2=c0005fd0b0 a3=25 items=0 ppid=1 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:22.460845 kubelet[1607]: I0515 00:56:22.460429 1607 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:56:22.460845 kubelet[1607]: I0515 00:56:22.460462 1607 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 00:56:22.460845 kubelet[1607]: I0515 00:56:22.460498 1607 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:56:22.460845 kubelet[1607]: I0515 00:56:22.460530 1607 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:56:22.460845 kubelet[1607]: I0515 00:56:22.460586 1607 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:56:22.461791 kubelet[1607]: I0515 00:56:22.461750 1607 server.go:490] "Adding debug handlers to kubelet server" May 15 00:56:22.463341 kubelet[1607]: I0515 00:56:22.463308 1607 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 00:56:22.462000 audit[1620]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.462000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe302db670 a2=0 a3=7ffe302db65c items=0 ppid=1607 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:56:22.463000 audit[1621]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.463000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbb250ff0 a2=0 a3=7ffcbb250fdc items=0 ppid=1607 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:56:22.465075 kubelet[1607]: I0515 00:56:22.465049 1607 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 00:56:22.465372 kubelet[1607]: E0515 00:56:22.465343 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:22.466205 kubelet[1607]: E0515 00:56:22.465750 1607 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="200ms" May 15 00:56:22.466205 kubelet[1607]: I0515 00:56:22.465900 1607 reconciler.go:26] "Reconciler: start to sync state" May 15 00:56:22.466205 kubelet[1607]: I0515 00:56:22.465948 1607 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 00:56:22.465000 audit[1623]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.465000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe8201140 a2=0 a3=7fffe820112c items=0 ppid=1607 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:22.466721 kubelet[1607]: W0515 00:56:22.466628 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:22.466721 kubelet[1607]: E0515 00:56:22.466678 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:22.467206 kubelet[1607]: I0515 00:56:22.467035 1607 factory.go:221] Registration of the systemd container factory successfully May 15 00:56:22.467206 kubelet[1607]: I0515 00:56:22.467128 1607 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:56:22.467843 kubelet[1607]: E0515 00:56:22.467682 1607 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:56:22.470961 kubelet[1607]: E0515 00:56:22.466870 1607 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.118:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.118:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f8d5659f9683b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 00:56:22.459263035 +0000 UTC m=+0.386651826,LastTimestamp:2025-05-15 00:56:22.459263035 +0000 UTC m=+0.386651826,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 00:56:22.471606 kubelet[1607]: I0515 00:56:22.471582 1607 factory.go:221] Registration of the containerd container factory successfully May 15 00:56:22.471000 audit[1625]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.471000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc35e39210 a2=0 a3=7ffc35e391fc items=0 ppid=1607 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:22.479000 audit[1633]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.479000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffde8e01770 a2=0 a3=7ffde8e0175c items=0 ppid=1607 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 00:56:22.480427 kubelet[1607]: I0515 00:56:22.480385 1607 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:56:22.480000 audit[1634]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:22.480000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff506aa220 a2=0 a3=7fff506aa20c items=0 ppid=1607 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:56:22.481543 kubelet[1607]: I0515 00:56:22.481528 1607 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:56:22.481651 kubelet[1607]: I0515 00:56:22.481637 1607 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 00:56:22.481801 kubelet[1607]: I0515 00:56:22.481752 1607 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 00:56:22.481890 kubelet[1607]: I0515 00:56:22.481876 1607 kubelet.go:2388] "Starting kubelet main sync loop" May 15 00:56:22.481000 audit[1635]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.481000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaa04ba70 a2=0 a3=7ffcaa04ba5c items=0 ppid=1607 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:56:22.482207 kubelet[1607]: E0515 00:56:22.482157 1607 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:56:22.482000 audit[1638]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.482000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd44f7d0d0 a2=0 a3=7ffd44f7d0bc items=0 ppid=1607 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:56:22.483000 audit[1639]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:22.483000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed4486590 a2=0 a3=7ffed448657c items=0 ppid=1607 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.483000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:56:22.484352 kubelet[1607]: I0515 00:56:22.484311 1607 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 00:56:22.484352 kubelet[1607]: I0515 00:56:22.484332 1607 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 00:56:22.484419 kubelet[1607]: I0515 00:56:22.484372 1607 state_mem.go:36] "Initialized new in-memory state store" May 15 00:56:22.485232 kubelet[1607]: W0515 00:56:22.485199 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:22.485286 kubelet[1607]: E0515 00:56:22.485240 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:22.484000 audit[1640]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:22.484000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea9b71bc0 a2=0 a3=7ffea9b71bac items=0 ppid=1607 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.484000 audit[1641]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:22.484000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd8dd95c40 a2=0 a3=7ffd8dd95c2c items=0 ppid=1607 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:56:22.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:56:22.485000 audit[1642]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:22.485000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9d72cf30 a2=0 a3=7ffe9d72cf1c items=0 ppid=1607 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:56:22.565862 kubelet[1607]: E0515 00:56:22.565830 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:22.583156 kubelet[1607]: E0515 00:56:22.583116 1607 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 00:56:22.667473 kubelet[1607]: E0515 00:56:22.666882 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:22.667473 kubelet[1607]: E0515 00:56:22.667225 1607 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="400ms" May 15 00:56:22.692109 kubelet[1607]: I0515 00:56:22.692076 1607 policy_none.go:49] "None policy: Start" May 15 00:56:22.692109 kubelet[1607]: I0515 00:56:22.692104 1607 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 00:56:22.692109 kubelet[1607]: I0515 00:56:22.692114 1607 state_mem.go:35] "Initializing new in-memory state store" May 15 00:56:22.699239 systemd[1]: Created slice kubepods.slice. May 15 00:56:22.702882 systemd[1]: Created slice kubepods-burstable.slice. May 15 00:56:22.705309 systemd[1]: Created slice kubepods-besteffort.slice. May 15 00:56:22.715656 kubelet[1607]: I0515 00:56:22.715620 1607 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:56:22.714000 audit[1607]: AVC avc: denied { mac_admin } for pid=1607 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:22.714000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:22.714000 audit[1607]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000822600 a1=c000a1aa98 a2=c0008225d0 a3=25 items=0 ppid=1 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:22.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:22.715902 kubelet[1607]: I0515 00:56:22.715697 1607 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:56:22.715902 kubelet[1607]: I0515 00:56:22.715831 1607 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 00:56:22.715902 kubelet[1607]: I0515 00:56:22.715844 1607 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:56:22.716541 kubelet[1607]: I0515 00:56:22.716167 1607 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:56:22.717000 kubelet[1607]: E0515 00:56:22.716971 1607 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 00:56:22.717000 kubelet[1607]: E0515 00:56:22.717006 1607 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 00:56:22.789016 systemd[1]: Created slice kubepods-burstable-podd6c21c593b124c77a7f024124c12284c.slice. May 15 00:56:22.798425 kubelet[1607]: E0515 00:56:22.798373 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:22.800335 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 15 00:56:22.810680 kubelet[1607]: E0515 00:56:22.810645 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:22.812264 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 15 00:56:22.814433 kubelet[1607]: E0515 00:56:22.814406 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:22.817212 kubelet[1607]: I0515 00:56:22.817175 1607 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 00:56:22.817550 kubelet[1607]: E0515 00:56:22.817523 1607 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 15 00:56:22.867852 kubelet[1607]: I0515 00:56:22.867813 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d6c21c593b124c77a7f024124c12284c-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d6c21c593b124c77a7f024124c12284c\") " pod="kube-system/kube-apiserver-localhost" May 15 00:56:22.867852 kubelet[1607]: I0515 00:56:22.867854 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d6c21c593b124c77a7f024124c12284c-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d6c21c593b124c77a7f024124c12284c\") " pod="kube-system/kube-apiserver-localhost" May 15 00:56:22.868028 kubelet[1607]: I0515 00:56:22.867876 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:22.868028 kubelet[1607]: I0515 00:56:22.867892 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:22.868028 kubelet[1607]: I0515 00:56:22.867908 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:22.868028 kubelet[1607]: I0515 00:56:22.867923 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:22.868028 kubelet[1607]: I0515 00:56:22.867938 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d6c21c593b124c77a7f024124c12284c-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d6c21c593b124c77a7f024124c12284c\") " pod="kube-system/kube-apiserver-localhost" May 15 00:56:22.868153 kubelet[1607]: I0515 00:56:22.868005 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 00:56:22.868153 kubelet[1607]: I0515 00:56:22.868062 1607 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:23.018875 kubelet[1607]: I0515 00:56:23.018757 1607 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 00:56:23.019179 kubelet[1607]: E0515 00:56:23.019138 1607 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 15 00:56:23.067744 kubelet[1607]: E0515 00:56:23.067708 1607 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="800ms" May 15 00:56:23.099099 kubelet[1607]: E0515 00:56:23.099069 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:23.099679 env[1201]: time="2025-05-15T00:56:23.099641720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d6c21c593b124c77a7f024124c12284c,Namespace:kube-system,Attempt:0,}" May 15 00:56:23.111899 kubelet[1607]: E0515 00:56:23.111871 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:23.112263 env[1201]: time="2025-05-15T00:56:23.112239509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 15 00:56:23.115521 kubelet[1607]: E0515 00:56:23.115492 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:23.115897 env[1201]: time="2025-05-15T00:56:23.115873639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 15 00:56:23.357386 kubelet[1607]: W0515 00:56:23.357323 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:23.357510 kubelet[1607]: E0515 00:56:23.357390 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:23.375295 kubelet[1607]: W0515 00:56:23.375256 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:23.375343 kubelet[1607]: E0515 00:56:23.375295 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:23.421054 kubelet[1607]: I0515 00:56:23.421032 1607 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 00:56:23.421414 kubelet[1607]: E0515 00:56:23.421371 1607 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" May 15 00:56:23.645854 kubelet[1607]: W0515 00:56:23.645725 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:23.645854 kubelet[1607]: E0515 00:56:23.645803 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:23.806186 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1000341801.mount: Deactivated successfully. May 15 00:56:23.812451 env[1201]: time="2025-05-15T00:56:23.812409668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.816731 env[1201]: time="2025-05-15T00:56:23.816708391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.818788 env[1201]: time="2025-05-15T00:56:23.818743014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.820910 env[1201]: time="2025-05-15T00:56:23.820864976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.821959 env[1201]: time="2025-05-15T00:56:23.821934941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.823397 env[1201]: time="2025-05-15T00:56:23.823346203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.824428 env[1201]: time="2025-05-15T00:56:23.824386824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.825610 env[1201]: time="2025-05-15T00:56:23.825577612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.826638 env[1201]: time="2025-05-15T00:56:23.826615315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.827886 env[1201]: time="2025-05-15T00:56:23.827858033Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.829309 env[1201]: time="2025-05-15T00:56:23.829277878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.833494 env[1201]: time="2025-05-15T00:56:23.833465141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:23.857781 env[1201]: time="2025-05-15T00:56:23.857705973Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:23.857963 env[1201]: time="2025-05-15T00:56:23.857743999Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:23.857963 env[1201]: time="2025-05-15T00:56:23.857754816Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:23.858069 env[1201]: time="2025-05-15T00:56:23.858000605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1dd4fd72652f86236488463a7f1f4df3fa6a5b0cfe380751ddd7fd4c94b217f5 pid=1649 runtime=io.containerd.runc.v2 May 15 00:56:23.863328 env[1201]: time="2025-05-15T00:56:23.863265902Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:23.863328 env[1201]: time="2025-05-15T00:56:23.863304509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:23.863328 env[1201]: time="2025-05-15T00:56:23.863314916Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:23.863564 env[1201]: time="2025-05-15T00:56:23.863470487Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3e8301b057c42a7607887687b5644304f3c399ebfbe000cebde8ccc320a071d pid=1665 runtime=io.containerd.runc.v2 May 15 00:56:23.863681 env[1201]: time="2025-05-15T00:56:23.863553426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:23.863681 env[1201]: time="2025-05-15T00:56:23.863579031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:23.863681 env[1201]: time="2025-05-15T00:56:23.863588093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:23.863760 env[1201]: time="2025-05-15T00:56:23.863719144Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2c63f72d473673f6a6906e7861b089c8d4033fa5ddb49c5d88113709116d77f pid=1679 runtime=io.containerd.runc.v2 May 15 00:56:23.868599 kubelet[1607]: E0515 00:56:23.868567 1607 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="1.6s" May 15 00:56:23.873669 systemd[1]: Started cri-containerd-1dd4fd72652f86236488463a7f1f4df3fa6a5b0cfe380751ddd7fd4c94b217f5.scope. May 15 00:56:23.877246 systemd[1]: Started cri-containerd-b2c63f72d473673f6a6906e7861b089c8d4033fa5ddb49c5d88113709116d77f.scope. May 15 00:56:23.881036 systemd[1]: Started cri-containerd-f3e8301b057c42a7607887687b5644304f3c399ebfbe000cebde8ccc320a071d.scope. May 15 00:56:23.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.887000 audit: BPF prog-id=58 op=LOAD May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643466643732363532663836323336343838343633613766316634 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643466643732363532663836323336343838343633613766316634 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit: BPF prog-id=59 op=LOAD May 15 00:56:23.889000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0002179d8 a2=78 a3=c0001f9d80 items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643466643732363532663836323336343838343633613766316634 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit: BPF prog-id=60 op=LOAD May 15 00:56:23.889000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000217770 a2=78 a3=c0001f9dc8 items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643466643732363532663836323336343838343633613766316634 May 15 00:56:23.889000 audit: BPF prog-id=60 op=UNLOAD May 15 00:56:23.889000 audit: BPF prog-id=59 op=UNLOAD May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.889000 audit: BPF prog-id=61 op=LOAD May 15 00:56:23.889000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000217c30 a2=78 a3=c0003ea1d8 items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643466643732363532663836323336343838343633613766316634 May 15 00:56:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit: BPF prog-id=62 op=LOAD May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1665 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653833303162303537633432613736303738383736383762353634 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1665 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653833303162303537633432613736303738383736383762353634 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit: BPF prog-id=63 op=LOAD May 15 00:56:23.892000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9fc0 items=0 ppid=1665 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653833303162303537633432613736303738383736383762353634 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit: BPF prog-id=64 op=LOAD May 15 00:56:23.892000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000394008 items=0 ppid=1665 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653833303162303537633432613736303738383736383762353634 May 15 00:56:23.892000 audit: BPF prog-id=64 op=UNLOAD May 15 00:56:23.892000 audit: BPF prog-id=63 op=UNLOAD May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.892000 audit: BPF prog-id=65 op=LOAD May 15 00:56:23.892000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394418 items=0 ppid=1665 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653833303162303537633432613736303738383736383762353634 May 15 00:56:23.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit: BPF prog-id=66 op=LOAD May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1679 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232633633663732643437333637336636613639303665373836316230 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1679 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232633633663732643437333637336636613639303665373836316230 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit: BPF prog-id=67 op=LOAD May 15 00:56:23.894000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002890e0 items=0 ppid=1679 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232633633663732643437333637336636613639303665373836316230 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.894000 audit: BPF prog-id=68 op=LOAD May 15 00:56:23.894000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000289128 items=0 ppid=1679 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232633633663732643437333637336636613639303665373836316230 May 15 00:56:23.895000 audit: BPF prog-id=68 op=UNLOAD May 15 00:56:23.895000 audit: BPF prog-id=67 op=UNLOAD May 15 00:56:23.895000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.895000 audit: BPF prog-id=69 op=LOAD May 15 00:56:23.895000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289538 items=0 ppid=1679 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232633633663732643437333637336636613639303665373836316230 May 15 00:56:23.915024 env[1201]: time="2025-05-15T00:56:23.914972848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"1dd4fd72652f86236488463a7f1f4df3fa6a5b0cfe380751ddd7fd4c94b217f5\"" May 15 00:56:23.915820 kubelet[1607]: E0515 00:56:23.915791 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:23.918727 env[1201]: time="2025-05-15T00:56:23.918701054Z" level=info msg="CreateContainer within sandbox \"1dd4fd72652f86236488463a7f1f4df3fa6a5b0cfe380751ddd7fd4c94b217f5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 00:56:23.920410 env[1201]: time="2025-05-15T00:56:23.920383039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"b2c63f72d473673f6a6906e7861b089c8d4033fa5ddb49c5d88113709116d77f\"" May 15 00:56:23.920783 kubelet[1607]: E0515 00:56:23.920749 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:23.921787 env[1201]: time="2025-05-15T00:56:23.921749690Z" level=info msg="CreateContainer within sandbox \"b2c63f72d473673f6a6906e7861b089c8d4033fa5ddb49c5d88113709116d77f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 00:56:23.925639 env[1201]: time="2025-05-15T00:56:23.925599613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d6c21c593b124c77a7f024124c12284c,Namespace:kube-system,Attempt:0,} returns sandbox id \"f3e8301b057c42a7607887687b5644304f3c399ebfbe000cebde8ccc320a071d\"" May 15 00:56:23.926444 kubelet[1607]: E0515 00:56:23.926423 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:23.927815 env[1201]: time="2025-05-15T00:56:23.927789477Z" level=info msg="CreateContainer within sandbox \"f3e8301b057c42a7607887687b5644304f3c399ebfbe000cebde8ccc320a071d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 00:56:23.942661 env[1201]: time="2025-05-15T00:56:23.942633741Z" level=info msg="CreateContainer within sandbox \"1dd4fd72652f86236488463a7f1f4df3fa6a5b0cfe380751ddd7fd4c94b217f5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2fb1e43e535755eb93fd9c162f9c131396402c92c0d0f75720f6a3e403d32a1a\"" May 15 00:56:23.943174 env[1201]: time="2025-05-15T00:56:23.943148968Z" level=info msg="StartContainer for \"2fb1e43e535755eb93fd9c162f9c131396402c92c0d0f75720f6a3e403d32a1a\"" May 15 00:56:23.949854 env[1201]: time="2025-05-15T00:56:23.949814160Z" level=info msg="CreateContainer within sandbox \"b2c63f72d473673f6a6906e7861b089c8d4033fa5ddb49c5d88113709116d77f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a402fcc5bd9fcd19e6767e6363f7fccb11c584838e16224610c481bdf665888a\"" May 15 00:56:23.950141 env[1201]: time="2025-05-15T00:56:23.950116010Z" level=info msg="StartContainer for \"a402fcc5bd9fcd19e6767e6363f7fccb11c584838e16224610c481bdf665888a\"" May 15 00:56:23.952372 env[1201]: time="2025-05-15T00:56:23.952335929Z" level=info msg="CreateContainer within sandbox \"f3e8301b057c42a7607887687b5644304f3c399ebfbe000cebde8ccc320a071d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"86152a3c85dcab53dce45b25f576cfbea04f279221e90db6d12a07337ce95345\"" May 15 00:56:23.952657 env[1201]: time="2025-05-15T00:56:23.952619422Z" level=info msg="StartContainer for \"86152a3c85dcab53dce45b25f576cfbea04f279221e90db6d12a07337ce95345\"" May 15 00:56:23.956316 systemd[1]: Started cri-containerd-2fb1e43e535755eb93fd9c162f9c131396402c92c0d0f75720f6a3e403d32a1a.scope. May 15 00:56:23.970489 systemd[1]: Started cri-containerd-a402fcc5bd9fcd19e6767e6363f7fccb11c584838e16224610c481bdf665888a.scope. May 15 00:56:23.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.971000 audit: BPF prog-id=70 op=LOAD May 15 00:56:23.974586 systemd[1]: Started cri-containerd-86152a3c85dcab53dce45b25f576cfbea04f279221e90db6d12a07337ce95345.scope. May 15 00:56:23.975000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1649 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623165343365353335373535656239336664396331363266396331 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1649 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623165343365353335373535656239336664396331363266396331 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.975000 audit: BPF prog-id=71 op=LOAD May 15 00:56:23.975000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039bb40 items=0 ppid=1649 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623165343365353335373535656239336664396331363266396331 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit: BPF prog-id=72 op=LOAD May 15 00:56:23.976000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039bb88 items=0 ppid=1649 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623165343365353335373535656239336664396331363266396331 May 15 00:56:23.976000 audit: BPF prog-id=72 op=UNLOAD May 15 00:56:23.976000 audit: BPF prog-id=71 op=UNLOAD May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.976000 audit: BPF prog-id=73 op=LOAD May 15 00:56:23.976000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039bf98 items=0 ppid=1649 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623165343365353335373535656239336664396331363266396331 May 15 00:56:23.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit: BPF prog-id=74 op=LOAD May 15 00:56:23.980000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1679 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303266636335626439666364313965363736376536333633663766 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1679 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303266636335626439666364313965363736376536333633663766 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.980000 audit: BPF prog-id=75 op=LOAD May 15 00:56:23.980000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003066e0 items=0 ppid=1679 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303266636335626439666364313965363736376536333633663766 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit: BPF prog-id=76 op=LOAD May 15 00:56:23.981000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000306728 items=0 ppid=1679 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303266636335626439666364313965363736376536333633663766 May 15 00:56:23.981000 audit: BPF prog-id=76 op=UNLOAD May 15 00:56:23.981000 audit: BPF prog-id=75 op=UNLOAD May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.982000 audit: BPF prog-id=77 op=LOAD May 15 00:56:23.981000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.981000 audit: BPF prog-id=78 op=LOAD May 15 00:56:23.981000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000306b38 items=0 ppid=1679 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134303266636335626439666364313965363736376536333633663766 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1665 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836313532613363383564636162353364636534356232356635373663 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1665 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836313532613363383564636162353364636534356232356635373663 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit: BPF prog-id=79 op=LOAD May 15 00:56:23.984000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000360e80 items=0 ppid=1665 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836313532613363383564636162353364636534356232356635373663 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit: BPF prog-id=80 op=LOAD May 15 00:56:23.984000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000360ec8 items=0 ppid=1665 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836313532613363383564636162353364636534356232356635373663 May 15 00:56:23.984000 audit: BPF prog-id=80 op=UNLOAD May 15 00:56:23.984000 audit: BPF prog-id=79 op=UNLOAD May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:23.984000 audit: BPF prog-id=81 op=LOAD May 15 00:56:23.984000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003612d8 items=0 ppid=1665 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:23.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836313532613363383564636162353364636534356232356635373663 May 15 00:56:24.013229 env[1201]: time="2025-05-15T00:56:24.008842131Z" level=info msg="StartContainer for \"86152a3c85dcab53dce45b25f576cfbea04f279221e90db6d12a07337ce95345\" returns successfully" May 15 00:56:24.014329 env[1201]: time="2025-05-15T00:56:24.014262123Z" level=info msg="StartContainer for \"2fb1e43e535755eb93fd9c162f9c131396402c92c0d0f75720f6a3e403d32a1a\" returns successfully" May 15 00:56:24.015648 env[1201]: time="2025-05-15T00:56:24.015596496Z" level=info msg="StartContainer for \"a402fcc5bd9fcd19e6767e6363f7fccb11c584838e16224610c481bdf665888a\" returns successfully" May 15 00:56:24.023379 kubelet[1607]: W0515 00:56:24.023338 1607 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused May 15 00:56:24.023437 kubelet[1607]: E0515 00:56:24.023390 1607 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" May 15 00:56:24.222685 kubelet[1607]: I0515 00:56:24.222604 1607 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 00:56:24.490318 kubelet[1607]: E0515 00:56:24.490222 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:24.490318 kubelet[1607]: E0515 00:56:24.490317 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:24.491641 kubelet[1607]: E0515 00:56:24.491617 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:24.491719 kubelet[1607]: E0515 00:56:24.491697 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:24.492888 kubelet[1607]: E0515 00:56:24.492868 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:24.492946 kubelet[1607]: E0515 00:56:24.492939 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:24.882000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.883990 kernel: kauditd_printk_skb: 561 callbacks suppressed May 15 00:56:24.884041 kernel: audit: type=1400 audit(1747270584.882:546): avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.882000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0068e2f30 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.893044 kernel: audit: type=1300 audit(1747270584.882:546): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0068e2f30 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.893088 kernel: audit: type=1327 audit(1747270584.882:546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.882000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.901000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.901000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003af22d0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.914016 kernel: audit: type=1400 audit(1747270584.901:547): avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.914091 kernel: audit: type=1300 audit(1747270584.901:547): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003af22d0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.914112 kernel: audit: type=1327 audit(1747270584.901:547): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.901000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.932820 kernel: audit: type=1400 audit(1747270584.901:548): avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.932956 kernel: audit: type=1300 audit(1747270584.901:548): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0068e30b0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.901000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0068e30b0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.937257 kernel: audit: type=1327 audit(1747270584.901:548): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.901000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.941151 kernel: audit: type=1400 audit(1747270584.901:549): avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.901000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0065d5fa0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.907000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.907000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c002280400 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:24.907000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:24.907000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0065687b0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:56:24.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:56:25.030001 kubelet[1607]: I0515 00:56:25.029958 1607 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 00:56:25.030001 kubelet[1607]: E0515 00:56:25.030003 1607 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 15 00:56:25.032614 kubelet[1607]: E0515 00:56:25.032557 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.132982 kubelet[1607]: E0515 00:56:25.132925 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.175000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:25.175000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:25.175000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005e0150 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:25.175000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:25.175000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000526620 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:25.175000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:25.233683 kubelet[1607]: E0515 00:56:25.233615 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.333872 kubelet[1607]: E0515 00:56:25.333825 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.434686 kubelet[1607]: E0515 00:56:25.434579 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.494914 kubelet[1607]: E0515 00:56:25.494876 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:25.495078 kubelet[1607]: E0515 00:56:25.494989 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:25.495078 kubelet[1607]: E0515 00:56:25.495018 1607 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 00:56:25.495147 kubelet[1607]: E0515 00:56:25.495129 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:25.535066 kubelet[1607]: E0515 00:56:25.535029 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.635586 kubelet[1607]: E0515 00:56:25.635553 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.736391 kubelet[1607]: E0515 00:56:25.736309 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.836935 kubelet[1607]: E0515 00:56:25.836888 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:25.937920 kubelet[1607]: E0515 00:56:25.937854 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:26.038941 kubelet[1607]: E0515 00:56:26.038822 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:26.139147 kubelet[1607]: E0515 00:56:26.139099 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:26.239741 kubelet[1607]: E0515 00:56:26.239682 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:26.340064 kubelet[1607]: E0515 00:56:26.340011 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:26.440892 kubelet[1607]: E0515 00:56:26.440860 1607 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:56:26.566397 kubelet[1607]: I0515 00:56:26.566362 1607 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 00:56:26.574125 kubelet[1607]: I0515 00:56:26.574091 1607 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 00:56:26.577254 kubelet[1607]: I0515 00:56:26.577231 1607 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 00:56:27.015903 systemd[1]: Reloading. May 15 00:56:27.072357 /usr/lib/systemd/system-generators/torcx-generator[1907]: time="2025-05-15T00:56:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:56:27.072386 /usr/lib/systemd/system-generators/torcx-generator[1907]: time="2025-05-15T00:56:27Z" level=info msg="torcx already run" May 15 00:56:27.133862 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:56:27.133878 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:56:27.136989 kubelet[1607]: I0515 00:56:27.136957 1607 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.142194 kubelet[1607]: E0515 00:56:27.142169 1607 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.142323 kubelet[1607]: E0515 00:56:27.142310 1607 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:27.150220 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:56:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.216000 audit: BPF prog-id=82 op=LOAD May 15 00:56:27.216000 audit: BPF prog-id=74 op=UNLOAD May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit: BPF prog-id=83 op=LOAD May 15 00:56:27.217000 audit: BPF prog-id=70 op=UNLOAD May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit: BPF prog-id=84 op=LOAD May 15 00:56:27.217000 audit: BPF prog-id=43 op=UNLOAD May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit: BPF prog-id=85 op=LOAD May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit: BPF prog-id=86 op=LOAD May 15 00:56:27.218000 audit: BPF prog-id=44 op=UNLOAD May 15 00:56:27.218000 audit: BPF prog-id=45 op=UNLOAD May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit: BPF prog-id=87 op=LOAD May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit: BPF prog-id=88 op=LOAD May 15 00:56:27.218000 audit: BPF prog-id=46 op=UNLOAD May 15 00:56:27.218000 audit: BPF prog-id=47 op=UNLOAD May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit: BPF prog-id=89 op=LOAD May 15 00:56:27.219000 audit: BPF prog-id=48 op=UNLOAD May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit: BPF prog-id=90 op=LOAD May 15 00:56:27.219000 audit: BPF prog-id=49 op=UNLOAD May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit: BPF prog-id=91 op=LOAD May 15 00:56:27.220000 audit: BPF prog-id=58 op=UNLOAD May 15 00:56:27.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit: BPF prog-id=92 op=LOAD May 15 00:56:27.221000 audit: BPF prog-id=50 op=UNLOAD May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit: BPF prog-id=93 op=LOAD May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit: BPF prog-id=94 op=LOAD May 15 00:56:27.221000 audit: BPF prog-id=51 op=UNLOAD May 15 00:56:27.221000 audit: BPF prog-id=52 op=UNLOAD May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit: BPF prog-id=95 op=LOAD May 15 00:56:27.221000 audit: BPF prog-id=53 op=UNLOAD May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit: BPF prog-id=96 op=LOAD May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit: BPF prog-id=97 op=LOAD May 15 00:56:27.222000 audit: BPF prog-id=54 op=UNLOAD May 15 00:56:27.222000 audit: BPF prog-id=55 op=UNLOAD May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.222000 audit: BPF prog-id=98 op=LOAD May 15 00:56:27.222000 audit: BPF prog-id=77 op=UNLOAD May 15 00:56:27.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.223000 audit: BPF prog-id=99 op=LOAD May 15 00:56:27.223000 audit: BPF prog-id=56 op=UNLOAD May 15 00:56:27.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.225000 audit: BPF prog-id=100 op=LOAD May 15 00:56:27.225000 audit: BPF prog-id=66 op=UNLOAD May 15 00:56:27.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.226000 audit: BPF prog-id=101 op=LOAD May 15 00:56:27.226000 audit: BPF prog-id=57 op=UNLOAD May 15 00:56:27.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.227000 audit: BPF prog-id=102 op=LOAD May 15 00:56:27.227000 audit: BPF prog-id=62 op=UNLOAD May 15 00:56:27.237973 kubelet[1607]: I0515 00:56:27.237793 1607 dynamic_cafile_content.go:175] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:56:27.238007 systemd[1]: Stopping kubelet.service... May 15 00:56:27.260990 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:56:27.261142 systemd[1]: Stopped kubelet.service. May 15 00:56:27.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:27.262488 systemd[1]: Starting kubelet.service... May 15 00:56:27.339897 systemd[1]: Started kubelet.service. May 15 00:56:27.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:27.372069 kubelet[1952]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:56:27.372416 kubelet[1952]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 00:56:27.372416 kubelet[1952]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:56:27.372569 kubelet[1952]: I0515 00:56:27.372464 1952 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:56:27.379916 kubelet[1952]: I0515 00:56:27.379880 1952 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 00:56:27.379916 kubelet[1952]: I0515 00:56:27.379904 1952 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:56:27.380207 kubelet[1952]: I0515 00:56:27.380183 1952 server.go:954] "Client rotation is on, will bootstrap in background" May 15 00:56:27.381282 kubelet[1952]: I0515 00:56:27.381262 1952 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 00:56:27.385444 kubelet[1952]: I0515 00:56:27.385422 1952 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:56:27.388443 kubelet[1952]: E0515 00:56:27.388420 1952 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 00:56:27.388443 kubelet[1952]: I0515 00:56:27.388443 1952 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 00:56:27.392006 kubelet[1952]: I0515 00:56:27.391985 1952 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:56:27.392173 kubelet[1952]: I0515 00:56:27.392142 1952 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:56:27.392411 kubelet[1952]: I0515 00:56:27.392168 1952 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 00:56:27.392508 kubelet[1952]: I0515 00:56:27.392413 1952 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:56:27.392508 kubelet[1952]: I0515 00:56:27.392428 1952 container_manager_linux.go:304] "Creating device plugin manager" May 15 00:56:27.392508 kubelet[1952]: I0515 00:56:27.392461 1952 state_mem.go:36] "Initialized new in-memory state store" May 15 00:56:27.392609 kubelet[1952]: I0515 00:56:27.392589 1952 kubelet.go:446] "Attempting to sync node with API server" May 15 00:56:27.392609 kubelet[1952]: I0515 00:56:27.392608 1952 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:56:27.392669 kubelet[1952]: I0515 00:56:27.392624 1952 kubelet.go:352] "Adding apiserver pod source" May 15 00:56:27.392669 kubelet[1952]: I0515 00:56:27.392632 1952 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:56:27.393203 kubelet[1952]: I0515 00:56:27.393174 1952 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:56:27.394123 kubelet[1952]: I0515 00:56:27.394097 1952 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:56:27.394894 kubelet[1952]: I0515 00:56:27.394848 1952 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 00:56:27.394956 kubelet[1952]: I0515 00:56:27.394912 1952 server.go:1287] "Started kubelet" May 15 00:56:27.398000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.398000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:27.398000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aa11a0 a1=c000758120 a2=c000aa1170 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:27.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:27.398000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.398000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:27.398000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000482c60 a1=c000758138 a2=c000aa1230 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:27.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:27.399331 kubelet[1952]: I0515 00:56:27.399042 1952 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:56:27.399331 kubelet[1952]: I0515 00:56:27.399087 1952 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 00:56:27.399331 kubelet[1952]: I0515 00:56:27.399122 1952 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:56:27.401808 kubelet[1952]: I0515 00:56:27.400648 1952 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:56:27.401808 kubelet[1952]: I0515 00:56:27.401409 1952 server.go:490] "Adding debug handlers to kubelet server" May 15 00:56:27.402093 kubelet[1952]: I0515 00:56:27.402049 1952 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:56:27.402222 kubelet[1952]: I0515 00:56:27.402201 1952 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:56:27.402363 kubelet[1952]: I0515 00:56:27.402342 1952 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 00:56:27.405746 kubelet[1952]: I0515 00:56:27.405729 1952 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 00:56:27.405922 kubelet[1952]: I0515 00:56:27.405911 1952 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 00:56:27.406073 kubelet[1952]: I0515 00:56:27.406060 1952 reconciler.go:26] "Reconciler: start to sync state" May 15 00:56:27.409926 kubelet[1952]: I0515 00:56:27.409776 1952 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:56:27.410846 kubelet[1952]: E0515 00:56:27.410755 1952 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:56:27.411226 kubelet[1952]: I0515 00:56:27.411213 1952 factory.go:221] Registration of the containerd container factory successfully May 15 00:56:27.411319 kubelet[1952]: I0515 00:56:27.411306 1952 factory.go:221] Registration of the systemd container factory successfully May 15 00:56:27.412710 kubelet[1952]: I0515 00:56:27.412635 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:56:27.413567 kubelet[1952]: I0515 00:56:27.413493 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:56:27.413567 kubelet[1952]: I0515 00:56:27.413538 1952 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 00:56:27.413567 kubelet[1952]: I0515 00:56:27.413558 1952 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 00:56:27.413567 kubelet[1952]: I0515 00:56:27.413565 1952 kubelet.go:2388] "Starting kubelet main sync loop" May 15 00:56:27.414373 kubelet[1952]: E0515 00:56:27.413609 1952 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:56:27.446259 kubelet[1952]: I0515 00:56:27.446218 1952 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 00:56:27.446259 kubelet[1952]: I0515 00:56:27.446235 1952 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 00:56:27.446461 kubelet[1952]: I0515 00:56:27.446276 1952 state_mem.go:36] "Initialized new in-memory state store" May 15 00:56:27.446461 kubelet[1952]: I0515 00:56:27.446437 1952 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 00:56:27.446461 kubelet[1952]: I0515 00:56:27.446446 1952 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 00:56:27.446524 kubelet[1952]: I0515 00:56:27.446465 1952 policy_none.go:49] "None policy: Start" May 15 00:56:27.446524 kubelet[1952]: I0515 00:56:27.446473 1952 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 00:56:27.446524 kubelet[1952]: I0515 00:56:27.446481 1952 state_mem.go:35] "Initializing new in-memory state store" May 15 00:56:27.446593 kubelet[1952]: I0515 00:56:27.446574 1952 state_mem.go:75] "Updated machine memory state" May 15 00:56:27.449947 kubelet[1952]: I0515 00:56:27.449923 1952 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:56:27.449000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:27.449000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:56:27.449000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb4c60 a1=c000dfe5d0 a2=c000bb4c30 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:27.449000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:56:27.450168 kubelet[1952]: I0515 00:56:27.449987 1952 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:56:27.450168 kubelet[1952]: I0515 00:56:27.450101 1952 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 00:56:27.450168 kubelet[1952]: I0515 00:56:27.450114 1952 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:56:27.450399 kubelet[1952]: I0515 00:56:27.450252 1952 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:56:27.451281 kubelet[1952]: E0515 00:56:27.451256 1952 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 00:56:27.514973 kubelet[1952]: I0515 00:56:27.514887 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.514973 kubelet[1952]: I0515 00:56:27.514901 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 00:56:27.515171 kubelet[1952]: I0515 00:56:27.514897 1952 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 00:56:27.520744 kubelet[1952]: E0515 00:56:27.520709 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 00:56:27.520958 kubelet[1952]: E0515 00:56:27.520932 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.520958 kubelet[1952]: E0515 00:56:27.520948 1952 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 00:56:27.555123 kubelet[1952]: I0515 00:56:27.555082 1952 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 00:56:27.561132 kubelet[1952]: I0515 00:56:27.561082 1952 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 15 00:56:27.561244 kubelet[1952]: I0515 00:56:27.561171 1952 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 00:56:27.609577 kubelet[1952]: I0515 00:56:27.607611 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d6c21c593b124c77a7f024124c12284c-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d6c21c593b124c77a7f024124c12284c\") " pod="kube-system/kube-apiserver-localhost" May 15 00:56:27.609577 kubelet[1952]: I0515 00:56:27.607645 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d6c21c593b124c77a7f024124c12284c-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d6c21c593b124c77a7f024124c12284c\") " pod="kube-system/kube-apiserver-localhost" May 15 00:56:27.609577 kubelet[1952]: I0515 00:56:27.607667 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d6c21c593b124c77a7f024124c12284c-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d6c21c593b124c77a7f024124c12284c\") " pod="kube-system/kube-apiserver-localhost" May 15 00:56:27.609577 kubelet[1952]: I0515 00:56:27.607685 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.609577 kubelet[1952]: I0515 00:56:27.607698 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.609912 kubelet[1952]: I0515 00:56:27.607710 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.609912 kubelet[1952]: I0515 00:56:27.607723 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 00:56:27.609912 kubelet[1952]: I0515 00:56:27.607743 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.609912 kubelet[1952]: I0515 00:56:27.607826 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:56:27.821940 kubelet[1952]: E0515 00:56:27.821895 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:27.822077 kubelet[1952]: E0515 00:56:27.821999 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:27.822077 kubelet[1952]: E0515 00:56:27.822033 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:28.393640 kubelet[1952]: I0515 00:56:28.393599 1952 apiserver.go:52] "Watching apiserver" May 15 00:56:28.406607 kubelet[1952]: I0515 00:56:28.406569 1952 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 00:56:28.435066 kubelet[1952]: E0515 00:56:28.435032 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:28.436164 kubelet[1952]: E0515 00:56:28.435541 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:28.436164 kubelet[1952]: E0515 00:56:28.435691 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:28.451189 kubelet[1952]: I0515 00:56:28.451102 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.451087094 podStartE2EDuration="2.451087094s" podCreationTimestamp="2025-05-15 00:56:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:56:28.4508904 +0000 UTC m=+1.106764536" watchObservedRunningTime="2025-05-15 00:56:28.451087094 +0000 UTC m=+1.106961219" May 15 00:56:28.461102 kubelet[1952]: I0515 00:56:28.461053 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.461035324 podStartE2EDuration="2.461035324s" podCreationTimestamp="2025-05-15 00:56:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:56:28.460676223 +0000 UTC m=+1.116550348" watchObservedRunningTime="2025-05-15 00:56:28.461035324 +0000 UTC m=+1.116909459" May 15 00:56:29.437229 kubelet[1952]: E0515 00:56:29.437192 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:29.437614 kubelet[1952]: E0515 00:56:29.437266 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:30.438315 kubelet[1952]: E0515 00:56:30.438284 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:31.806000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 00:56:31.812484 kernel: kauditd_printk_skb: 272 callbacks suppressed May 15 00:56:31.812553 kernel: audit: type=1400 audit(1747270591.806:803): avc: denied { watch } for pid=1809 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 00:56:31.817422 kernel: audit: type=1300 audit(1747270591.806:803): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00017d7c0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:31.806000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00017d7c0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:31.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:31.821780 kernel: audit: type=1327 audit(1747270591.806:803): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:31.874188 sudo[1339]: pam_unix(sudo:session): session closed for user root May 15 00:56:31.873000 audit[1339]: USER_END pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:31.875416 sshd[1336]: pam_unix(sshd:session): session closed for user core May 15 00:56:31.877376 systemd[1]: sshd@6-10.0.0.118:22-10.0.0.1:47216.service: Deactivated successfully. May 15 00:56:31.873000 audit[1339]: CRED_DISP pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:31.878146 systemd[1]: session-7.scope: Deactivated successfully. May 15 00:56:31.878292 systemd[1]: session-7.scope: Consumed 3.486s CPU time. May 15 00:56:31.879113 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. May 15 00:56:31.879847 systemd-logind[1187]: Removed session 7. May 15 00:56:31.881157 kernel: audit: type=1106 audit(1747270591.873:804): pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:31.881203 kernel: audit: type=1104 audit(1747270591.873:805): pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:56:31.881224 kernel: audit: type=1106 audit(1747270591.873:806): pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:31.873000 audit[1336]: USER_END pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:31.885298 kernel: audit: type=1104 audit(1747270591.873:807): pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:31.873000 audit[1336]: CRED_DISP pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:31.888630 kernel: audit: type=1131 audit(1747270591.873:808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:47216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:31.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:47216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:32.756000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:32.756000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001720ae0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:32.777448 kernel: audit: type=1400 audit(1747270592.756:809): avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:32.777505 kernel: audit: type=1300 audit(1747270592.756:809): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001720ae0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:32.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:32.756000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:32.756000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00156f4c0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:32.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:32.757000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:32.757000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00156f680 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:32.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:32.757000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:56:32.757000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00156f6a0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:56:32.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:56:33.288392 kubelet[1952]: I0515 00:56:33.288363 1952 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 00:56:33.288820 kubelet[1952]: I0515 00:56:33.288803 1952 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 00:56:33.288877 env[1201]: time="2025-05-15T00:56:33.288629571Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 00:56:33.871480 kubelet[1952]: I0515 00:56:33.871427 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=7.871389843 podStartE2EDuration="7.871389843s" podCreationTimestamp="2025-05-15 00:56:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:56:28.472906517 +0000 UTC m=+1.128780652" watchObservedRunningTime="2025-05-15 00:56:33.871389843 +0000 UTC m=+6.527263978" May 15 00:56:33.876337 systemd[1]: Created slice kubepods-besteffort-pod514f8ec7_3af2_419d_b3c0_72dc778980b8.slice. May 15 00:56:33.949571 kubelet[1952]: I0515 00:56:33.949526 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/514f8ec7-3af2-419d-b3c0-72dc778980b8-lib-modules\") pod \"kube-proxy-s8z5q\" (UID: \"514f8ec7-3af2-419d-b3c0-72dc778980b8\") " pod="kube-system/kube-proxy-s8z5q" May 15 00:56:33.949571 kubelet[1952]: I0515 00:56:33.949558 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sndr5\" (UniqueName: \"kubernetes.io/projected/514f8ec7-3af2-419d-b3c0-72dc778980b8-kube-api-access-sndr5\") pod \"kube-proxy-s8z5q\" (UID: \"514f8ec7-3af2-419d-b3c0-72dc778980b8\") " pod="kube-system/kube-proxy-s8z5q" May 15 00:56:33.949571 kubelet[1952]: I0515 00:56:33.949574 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/514f8ec7-3af2-419d-b3c0-72dc778980b8-kube-proxy\") pod \"kube-proxy-s8z5q\" (UID: \"514f8ec7-3af2-419d-b3c0-72dc778980b8\") " pod="kube-system/kube-proxy-s8z5q" May 15 00:56:33.949812 kubelet[1952]: I0515 00:56:33.949591 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/514f8ec7-3af2-419d-b3c0-72dc778980b8-xtables-lock\") pod \"kube-proxy-s8z5q\" (UID: \"514f8ec7-3af2-419d-b3c0-72dc778980b8\") " pod="kube-system/kube-proxy-s8z5q" May 15 00:56:34.055896 kubelet[1952]: E0515 00:56:34.055858 1952 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 15 00:56:34.055896 kubelet[1952]: E0515 00:56:34.055893 1952 projected.go:194] Error preparing data for projected volume kube-api-access-sndr5 for pod kube-system/kube-proxy-s8z5q: configmap "kube-root-ca.crt" not found May 15 00:56:34.056055 kubelet[1952]: E0515 00:56:34.055955 1952 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/514f8ec7-3af2-419d-b3c0-72dc778980b8-kube-api-access-sndr5 podName:514f8ec7-3af2-419d-b3c0-72dc778980b8 nodeName:}" failed. No retries permitted until 2025-05-15 00:56:34.555933679 +0000 UTC m=+7.211807814 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-sndr5" (UniqueName: "kubernetes.io/projected/514f8ec7-3af2-419d-b3c0-72dc778980b8-kube-api-access-sndr5") pod "kube-proxy-s8z5q" (UID: "514f8ec7-3af2-419d-b3c0-72dc778980b8") : configmap "kube-root-ca.crt" not found May 15 00:56:34.385188 systemd[1]: Created slice kubepods-besteffort-pod07c884ac_02dd_4ea8_bf6b_735ed19a5e5d.slice. May 15 00:56:34.452651 kubelet[1952]: I0515 00:56:34.452596 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/07c884ac-02dd-4ea8-bf6b-735ed19a5e5d-var-lib-calico\") pod \"tigera-operator-789496d6f5-9pgmp\" (UID: \"07c884ac-02dd-4ea8-bf6b-735ed19a5e5d\") " pod="tigera-operator/tigera-operator-789496d6f5-9pgmp" May 15 00:56:34.452651 kubelet[1952]: I0515 00:56:34.452646 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j6jmx\" (UniqueName: \"kubernetes.io/projected/07c884ac-02dd-4ea8-bf6b-735ed19a5e5d-kube-api-access-j6jmx\") pod \"tigera-operator-789496d6f5-9pgmp\" (UID: \"07c884ac-02dd-4ea8-bf6b-735ed19a5e5d\") " pod="tigera-operator/tigera-operator-789496d6f5-9pgmp" May 15 00:56:34.557681 kubelet[1952]: I0515 00:56:34.557650 1952 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 00:56:34.688752 env[1201]: time="2025-05-15T00:56:34.688663251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-9pgmp,Uid:07c884ac-02dd-4ea8-bf6b-735ed19a5e5d,Namespace:tigera-operator,Attempt:0,}" May 15 00:56:34.701112 env[1201]: time="2025-05-15T00:56:34.701043881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:34.701112 env[1201]: time="2025-05-15T00:56:34.701081812Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:34.701284 env[1201]: time="2025-05-15T00:56:34.701094118Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:34.701519 env[1201]: time="2025-05-15T00:56:34.701473067Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dba14015273a1c1078192776680b7e1e44d676b34e2669b633c25cbb29ef794f pid=2047 runtime=io.containerd.runc.v2 May 15 00:56:34.718877 systemd[1]: Started cri-containerd-dba14015273a1c1078192776680b7e1e44d676b34e2669b633c25cbb29ef794f.scope. May 15 00:56:34.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.729000 audit: BPF prog-id=103 op=LOAD May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2047 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613134303135323733613163313037383139323737363638306237 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2047 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613134303135323733613163313037383139323737363638306237 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit: BPF prog-id=104 op=LOAD May 15 00:56:34.730000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00028bcc0 items=0 ppid=2047 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613134303135323733613163313037383139323737363638306237 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit: BPF prog-id=105 op=LOAD May 15 00:56:34.730000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00028bd08 items=0 ppid=2047 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613134303135323733613163313037383139323737363638306237 May 15 00:56:34.730000 audit: BPF prog-id=105 op=UNLOAD May 15 00:56:34.730000 audit: BPF prog-id=104 op=UNLOAD May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.730000 audit: BPF prog-id=106 op=LOAD May 15 00:56:34.730000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000410118 items=0 ppid=2047 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613134303135323733613163313037383139323737363638306237 May 15 00:56:34.752055 env[1201]: time="2025-05-15T00:56:34.752003596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-9pgmp,Uid:07c884ac-02dd-4ea8-bf6b-735ed19a5e5d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"dba14015273a1c1078192776680b7e1e44d676b34e2669b633c25cbb29ef794f\"" May 15 00:56:34.753725 env[1201]: time="2025-05-15T00:56:34.753664432Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 00:56:34.786327 kubelet[1952]: E0515 00:56:34.786299 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:34.787273 env[1201]: time="2025-05-15T00:56:34.787225667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s8z5q,Uid:514f8ec7-3af2-419d-b3c0-72dc778980b8,Namespace:kube-system,Attempt:0,}" May 15 00:56:34.801664 env[1201]: time="2025-05-15T00:56:34.801568494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:34.801664 env[1201]: time="2025-05-15T00:56:34.801616507Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:34.801664 env[1201]: time="2025-05-15T00:56:34.801627289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:34.801836 env[1201]: time="2025-05-15T00:56:34.801795008Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8c34beb525efc5872f6c4357bebdb42f4815f79b56b873194cd99964109ad87 pid=2089 runtime=io.containerd.runc.v2 May 15 00:56:34.810619 systemd[1]: Started cri-containerd-f8c34beb525efc5872f6c4357bebdb42f4815f79b56b873194cd99964109ad87.scope. May 15 00:56:34.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.818000 audit: BPF prog-id=107 op=LOAD May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2089 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638633334626562353235656663353837326636633433353762656264 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2089 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638633334626562353235656663353837326636633433353762656264 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit: BPF prog-id=108 op=LOAD May 15 00:56:34.819000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028d8c0 items=0 ppid=2089 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638633334626562353235656663353837326636633433353762656264 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit: BPF prog-id=109 op=LOAD May 15 00:56:34.819000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028d908 items=0 ppid=2089 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638633334626562353235656663353837326636633433353762656264 May 15 00:56:34.819000 audit: BPF prog-id=109 op=UNLOAD May 15 00:56:34.819000 audit: BPF prog-id=108 op=UNLOAD May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.819000 audit: BPF prog-id=110 op=LOAD May 15 00:56:34.819000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028dd18 items=0 ppid=2089 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638633334626562353235656663353837326636633433353762656264 May 15 00:56:34.829933 env[1201]: time="2025-05-15T00:56:34.829881124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s8z5q,Uid:514f8ec7-3af2-419d-b3c0-72dc778980b8,Namespace:kube-system,Attempt:0,} returns sandbox id \"f8c34beb525efc5872f6c4357bebdb42f4815f79b56b873194cd99964109ad87\"" May 15 00:56:34.830268 kubelet[1952]: E0515 00:56:34.830249 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:34.831787 env[1201]: time="2025-05-15T00:56:34.831739321Z" level=info msg="CreateContainer within sandbox \"f8c34beb525efc5872f6c4357bebdb42f4815f79b56b873194cd99964109ad87\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 00:56:34.846482 env[1201]: time="2025-05-15T00:56:34.846437388Z" level=info msg="CreateContainer within sandbox \"f8c34beb525efc5872f6c4357bebdb42f4815f79b56b873194cd99964109ad87\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6f64320faeb6207e8a97d1ef7c80c6c4da23575606f957385abad74d4214137d\"" May 15 00:56:34.846916 env[1201]: time="2025-05-15T00:56:34.846890314Z" level=info msg="StartContainer for \"6f64320faeb6207e8a97d1ef7c80c6c4da23575606f957385abad74d4214137d\"" May 15 00:56:34.860929 systemd[1]: Started cri-containerd-6f64320faeb6207e8a97d1ef7c80c6c4da23575606f957385abad74d4214137d.scope. May 15 00:56:34.875000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8a7a82a718 items=0 ppid=2089 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363433323066616562363230376538613937643165663763383063 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.875000 audit: BPF prog-id=111 op=LOAD May 15 00:56:34.875000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000313f18 items=0 ppid=2089 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363433323066616562363230376538613937643165663763383063 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit: BPF prog-id=112 op=LOAD May 15 00:56:34.876000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000313f68 items=0 ppid=2089 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363433323066616562363230376538613937643165663763383063 May 15 00:56:34.876000 audit: BPF prog-id=112 op=UNLOAD May 15 00:56:34.876000 audit: BPF prog-id=111 op=UNLOAD May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:34.876000 audit: BPF prog-id=113 op=LOAD May 15 00:56:34.876000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000313ff8 items=0 ppid=2089 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363433323066616562363230376538613937643165663763383063 May 15 00:56:34.891343 env[1201]: time="2025-05-15T00:56:34.891300087Z" level=info msg="StartContainer for \"6f64320faeb6207e8a97d1ef7c80c6c4da23575606f957385abad74d4214137d\" returns successfully" May 15 00:56:34.999000 audit[2190]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:34.999000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7c045db0 a2=0 a3=7ffe7c045d9c items=0 ppid=2140 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:34.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:56:35.000000 audit[2192]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.000000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc60dabec0 a2=0 a3=7ffc60dabeac items=0 ppid=2140 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:56:35.002000 audit[2191]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.002000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6806b000 a2=0 a3=7ffd6806afec items=0 ppid=2140 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:56:35.002000 audit[2194]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.002000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe09f8cc40 a2=0 a3=7ffe09f8cc2c items=0 ppid=2140 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:56:35.002000 audit[2195]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.002000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2b833be0 a2=0 a3=7fff2b833bcc items=0 ppid=2140 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:56:35.003000 audit[2196]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.003000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1eb3bd30 a2=0 a3=7ffd1eb3bd1c items=0 ppid=2140 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:56:35.103000 audit[2197]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.103000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc078d7130 a2=0 a3=7ffc078d711c items=0 ppid=2140 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:56:35.105000 audit[2199]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.105000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc1ceb110 a2=0 a3=7ffdc1ceb0fc items=0 ppid=2140 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 00:56:35.107778 kubelet[1952]: E0515 00:56:35.107713 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:35.109000 audit[2202]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.109000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcff4cb930 a2=0 a3=7ffcff4cb91c items=0 ppid=2140 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 00:56:35.110000 audit[2203]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.110000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca4586530 a2=0 a3=7ffca458651c items=0 ppid=2140 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:56:35.113000 audit[2205]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.113000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc10d6f3e0 a2=0 a3=7ffc10d6f3cc items=0 ppid=2140 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:56:35.114000 audit[2206]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.114000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd11ad250 a2=0 a3=7ffdd11ad23c items=0 ppid=2140 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:56:35.116000 audit[2208]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.116000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd95dd9cc0 a2=0 a3=7ffd95dd9cac items=0 ppid=2140 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:56:35.120000 audit[2211]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.120000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffbe19e4e0 a2=0 a3=7fffbe19e4cc items=0 ppid=2140 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 00:56:35.121000 audit[2212]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.121000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0f86c9d0 a2=0 a3=7ffe0f86c9bc items=0 ppid=2140 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:56:35.123000 audit[2214]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.123000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc04020950 a2=0 a3=7ffc0402093c items=0 ppid=2140 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:56:35.125000 audit[2215]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.125000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefa6edc90 a2=0 a3=7ffefa6edc7c items=0 ppid=2140 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:56:35.127000 audit[2217]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.127000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe70fb26f0 a2=0 a3=7ffe70fb26dc items=0 ppid=2140 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:56:35.130000 audit[2220]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.130000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffbd31d40 a2=0 a3=7ffffbd31d2c items=0 ppid=2140 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:56:35.133000 audit[2223]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.133000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffda0d3710 a2=0 a3=7fffda0d36fc items=0 ppid=2140 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:56:35.134000 audit[2224]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.134000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe29595040 a2=0 a3=7ffe2959502c items=0 ppid=2140 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:56:35.136000 audit[2226]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.136000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd2d4e3e80 a2=0 a3=7ffd2d4e3e6c items=0 ppid=2140 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:35.139000 audit[2229]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.139000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff739f2610 a2=0 a3=7fff739f25fc items=0 ppid=2140 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:35.140000 audit[2230]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.140000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe174245b0 a2=0 a3=7ffe1742459c items=0 ppid=2140 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:56:35.144000 audit[2232]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:56:35.144000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd7d12e2a0 a2=0 a3=7ffd7d12e28c items=0 ppid=2140 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:56:35.167000 audit[2238]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:35.167000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffc1a7ec70 a2=0 a3=7fffc1a7ec5c items=0 ppid=2140 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:35.177000 audit[2238]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:35.177000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffc1a7ec70 a2=0 a3=7fffc1a7ec5c items=0 ppid=2140 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:35.179000 audit[2243]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.179000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee94de0f0 a2=0 a3=7ffee94de0dc items=0 ppid=2140 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:56:35.181000 audit[2245]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.181000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe004f4b50 a2=0 a3=7ffe004f4b3c items=0 ppid=2140 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 00:56:35.183000 audit[2248]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.183000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc2c7ed900 a2=0 a3=7ffc2c7ed8ec items=0 ppid=2140 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 00:56:35.184000 audit[2249]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.184000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdeb747e30 a2=0 a3=7ffdeb747e1c items=0 ppid=2140 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:56:35.186000 audit[2251]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.186000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdee17d2c0 a2=0 a3=7ffdee17d2ac items=0 ppid=2140 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:56:35.187000 audit[2252]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.187000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd4aeda50 a2=0 a3=7ffdd4aeda3c items=0 ppid=2140 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:56:35.189000 audit[2254]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.189000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf418f4e0 a2=0 a3=7ffdf418f4cc items=0 ppid=2140 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 00:56:35.192000 audit[2257]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.192000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe4454b100 a2=0 a3=7ffe4454b0ec items=0 ppid=2140 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:56:35.193000 audit[2258]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.193000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe52f36ad0 a2=0 a3=7ffe52f36abc items=0 ppid=2140 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:56:35.194000 audit[2260]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.194000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7a23fa70 a2=0 a3=7ffc7a23fa5c items=0 ppid=2140 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:56:35.196000 audit[2261]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.196000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc95f12c60 a2=0 a3=7ffc95f12c4c items=0 ppid=2140 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:56:35.198000 audit[2263]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.198000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd99231b30 a2=0 a3=7ffd99231b1c items=0 ppid=2140 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:56:35.201000 audit[2266]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.201000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc2ea0420 a2=0 a3=7fffc2ea040c items=0 ppid=2140 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:56:35.204000 audit[2269]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.204000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf5302570 a2=0 a3=7ffdf530255c items=0 ppid=2140 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 00:56:35.204000 audit[2270]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.204000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc5b79210 a2=0 a3=7ffcc5b791fc items=0 ppid=2140 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:56:35.206000 audit[2272]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.206000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffc14f3210 a2=0 a3=7fffc14f31fc items=0 ppid=2140 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:35.209000 audit[2275]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.209000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc7ba68130 a2=0 a3=7ffc7ba6811c items=0 ppid=2140 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:56:35.210000 audit[2276]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.210000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd268e1e60 a2=0 a3=7ffd268e1e4c items=0 ppid=2140 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:56:35.211000 audit[2278]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.211000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0712a170 a2=0 a3=7ffd0712a15c items=0 ppid=2140 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:56:35.212000 audit[2279]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.212000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffffce3000 a2=0 a3=7fffffce2fec items=0 ppid=2140 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:56:35.214000 audit[2281]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.214000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9ea8b280 a2=0 a3=7ffc9ea8b26c items=0 ppid=2140 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:35.217000 audit[2284]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:56:35.217000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff19dea030 a2=0 a3=7fff19dea01c items=0 ppid=2140 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:56:35.220000 audit[2286]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:56:35.220000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff19b7bac0 a2=0 a3=7fff19b7baac items=0 ppid=2140 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.220000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:35.220000 audit[2286]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:56:35.220000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff19b7bac0 a2=0 a3=7fff19b7baac items=0 ppid=2140 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:35.220000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:35.446607 kubelet[1952]: E0515 00:56:35.446569 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:35.447208 kubelet[1952]: E0515 00:56:35.447182 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:35.456873 kubelet[1952]: I0515 00:56:35.456810 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-s8z5q" podStartSLOduration=2.456791577 podStartE2EDuration="2.456791577s" podCreationTimestamp="2025-05-15 00:56:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:56:35.45642536 +0000 UTC m=+8.112299525" watchObservedRunningTime="2025-05-15 00:56:35.456791577 +0000 UTC m=+8.112665732" May 15 00:56:35.563544 systemd[1]: run-containerd-runc-k8s.io-dba14015273a1c1078192776680b7e1e44d676b34e2669b633c25cbb29ef794f-runc.ySNd79.mount: Deactivated successfully. May 15 00:56:36.449561 kubelet[1952]: E0515 00:56:36.449522 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:36.705779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount910025221.mount: Deactivated successfully. May 15 00:56:36.895159 kubelet[1952]: E0515 00:56:36.895107 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:37.453752 kubelet[1952]: E0515 00:56:37.452563 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:37.488668 env[1201]: time="2025-05-15T00:56:37.488603701Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:37.491077 env[1201]: time="2025-05-15T00:56:37.491044595Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:37.492679 env[1201]: time="2025-05-15T00:56:37.492653055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:37.494126 env[1201]: time="2025-05-15T00:56:37.494094666Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:37.494560 env[1201]: time="2025-05-15T00:56:37.494527733Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 00:56:37.496587 env[1201]: time="2025-05-15T00:56:37.496559350Z" level=info msg="CreateContainer within sandbox \"dba14015273a1c1078192776680b7e1e44d676b34e2669b633c25cbb29ef794f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 00:56:37.507694 env[1201]: time="2025-05-15T00:56:37.507641019Z" level=info msg="CreateContainer within sandbox \"dba14015273a1c1078192776680b7e1e44d676b34e2669b633c25cbb29ef794f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a4ba64c9c9168253b52ef74f7f89edf243997f241cb8c3feee13f6986542da5c\"" May 15 00:56:37.508087 env[1201]: time="2025-05-15T00:56:37.508041278Z" level=info msg="StartContainer for \"a4ba64c9c9168253b52ef74f7f89edf243997f241cb8c3feee13f6986542da5c\"" May 15 00:56:37.524234 systemd[1]: Started cri-containerd-a4ba64c9c9168253b52ef74f7f89edf243997f241cb8c3feee13f6986542da5c.scope. May 15 00:56:37.572305 kernel: kauditd_printk_skb: 320 callbacks suppressed May 15 00:56:37.572459 kernel: audit: type=1400 audit(1747270597.564:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.572494 kernel: audit: type=1400 audit(1747270597.564:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.572518 kernel: audit: type=1400 audit(1747270597.564:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.583675 kernel: audit: type=1400 audit(1747270597.564:909): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.583806 kernel: audit: type=1400 audit(1747270597.564:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.589674 kernel: audit: type=1400 audit(1747270597.564:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.589724 kernel: audit: type=1400 audit(1747270597.564:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.599638 kernel: audit: type=1400 audit(1747270597.564:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.599681 kernel: audit: type=1400 audit(1747270597.564:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.605979 kernel: audit: type=1400 audit(1747270597.568:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit: BPF prog-id=114 op=LOAD May 15 00:56:37.568000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2047 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:37.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134626136346339633931363832353362353265663734663766383965 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2047 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:37.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134626136346339633931363832353362353265663734663766383965 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.568000 audit: BPF prog-id=115 op=LOAD May 15 00:56:37.568000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000326c70 items=0 ppid=2047 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:37.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134626136346339633931363832353362353265663734663766383965 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.571000 audit: BPF prog-id=116 op=LOAD May 15 00:56:37.571000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000326cb8 items=0 ppid=2047 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:37.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134626136346339633931363832353362353265663734663766383965 May 15 00:56:37.579000 audit: BPF prog-id=116 op=UNLOAD May 15 00:56:37.579000 audit: BPF prog-id=115 op=UNLOAD May 15 00:56:37.579000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:37.579000 audit: BPF prog-id=117 op=LOAD May 15 00:56:37.579000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003270c8 items=0 ppid=2047 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:37.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134626136346339633931363832353362353265663734663766383965 May 15 00:56:37.740592 env[1201]: time="2025-05-15T00:56:37.740470749Z" level=info msg="StartContainer for \"a4ba64c9c9168253b52ef74f7f89edf243997f241cb8c3feee13f6986542da5c\" returns successfully" May 15 00:56:40.035604 kubelet[1952]: E0515 00:56:40.035562 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:40.078696 kubelet[1952]: I0515 00:56:40.078612 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-9pgmp" podStartSLOduration=3.336493307 podStartE2EDuration="6.078588978s" podCreationTimestamp="2025-05-15 00:56:34 +0000 UTC" firstStartedPulling="2025-05-15 00:56:34.753212858 +0000 UTC m=+7.409086993" lastFinishedPulling="2025-05-15 00:56:37.495308529 +0000 UTC m=+10.151182664" observedRunningTime="2025-05-15 00:56:38.499610477 +0000 UTC m=+11.155484632" watchObservedRunningTime="2025-05-15 00:56:40.078588978 +0000 UTC m=+12.734463123" May 15 00:56:40.379000 audit[2328]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:40.379000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf1a1af60 a2=0 a3=7ffdf1a1af4c items=0 ppid=2140 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:40.383000 audit[2328]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:40.383000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf1a1af60 a2=0 a3=0 items=0 ppid=2140 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:40.392000 audit[2330]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:40.392000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffddca87890 a2=0 a3=7ffddca8787c items=0 ppid=2140 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:40.397000 audit[2330]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:40.397000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffddca87890 a2=0 a3=0 items=0 ppid=2140 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:40.459362 kubelet[1952]: E0515 00:56:40.459334 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:40.591710 systemd[1]: Created slice kubepods-besteffort-pod7345ae31_068b_495f_b23d_6b6d8c81b83d.slice. May 15 00:56:40.605412 systemd[1]: Created slice kubepods-besteffort-pod82c69aa6_374c_4143_a0d9_2c418c663f3b.slice. May 15 00:56:40.664933 kubelet[1952]: E0515 00:56:40.664827 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:40.693903 kubelet[1952]: I0515 00:56:40.693860 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-lib-modules\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.693903 kubelet[1952]: I0515 00:56:40.693905 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/82c69aa6-374c-4143-a0d9-2c418c663f3b-tigera-ca-bundle\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694194 kubelet[1952]: I0515 00:56:40.693922 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-policysync\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694194 kubelet[1952]: I0515 00:56:40.693935 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-run-calico\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694194 kubelet[1952]: I0515 00:56:40.693948 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-flexvol-driver-host\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694194 kubelet[1952]: I0515 00:56:40.693965 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7345ae31-068b-495f-b23d-6b6d8c81b83d-typha-certs\") pod \"calico-typha-8578ffc444-phm54\" (UID: \"7345ae31-068b-495f-b23d-6b6d8c81b83d\") " pod="calico-system/calico-typha-8578ffc444-phm54" May 15 00:56:40.694194 kubelet[1952]: I0515 00:56:40.693979 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-lib-calico\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694392 kubelet[1952]: I0515 00:56:40.693991 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c5fc9436-49d5-4858-9e14-f9808a9046d4-kubelet-dir\") pod \"csi-node-driver-8b5hz\" (UID: \"c5fc9436-49d5-4858-9e14-f9808a9046d4\") " pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:40.694392 kubelet[1952]: I0515 00:56:40.694003 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c5fc9436-49d5-4858-9e14-f9808a9046d4-socket-dir\") pod \"csi-node-driver-8b5hz\" (UID: \"c5fc9436-49d5-4858-9e14-f9808a9046d4\") " pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:40.694392 kubelet[1952]: I0515 00:56:40.694020 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c5fc9436-49d5-4858-9e14-f9808a9046d4-registration-dir\") pod \"csi-node-driver-8b5hz\" (UID: \"c5fc9436-49d5-4858-9e14-f9808a9046d4\") " pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:40.694392 kubelet[1952]: I0515 00:56:40.694034 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x85jh\" (UniqueName: \"kubernetes.io/projected/7345ae31-068b-495f-b23d-6b6d8c81b83d-kube-api-access-x85jh\") pod \"calico-typha-8578ffc444-phm54\" (UID: \"7345ae31-068b-495f-b23d-6b6d8c81b83d\") " pod="calico-system/calico-typha-8578ffc444-phm54" May 15 00:56:40.694392 kubelet[1952]: I0515 00:56:40.694047 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-bin-dir\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694572 kubelet[1952]: I0515 00:56:40.694061 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7345ae31-068b-495f-b23d-6b6d8c81b83d-tigera-ca-bundle\") pod \"calico-typha-8578ffc444-phm54\" (UID: \"7345ae31-068b-495f-b23d-6b6d8c81b83d\") " pod="calico-system/calico-typha-8578ffc444-phm54" May 15 00:56:40.694572 kubelet[1952]: I0515 00:56:40.694073 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-xtables-lock\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694572 kubelet[1952]: I0515 00:56:40.694087 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkqww\" (UniqueName: \"kubernetes.io/projected/82c69aa6-374c-4143-a0d9-2c418c663f3b-kube-api-access-lkqww\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694572 kubelet[1952]: I0515 00:56:40.694098 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jhxfd\" (UniqueName: \"kubernetes.io/projected/c5fc9436-49d5-4858-9e14-f9808a9046d4-kube-api-access-jhxfd\") pod \"csi-node-driver-8b5hz\" (UID: \"c5fc9436-49d5-4858-9e14-f9808a9046d4\") " pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:40.694572 kubelet[1952]: I0515 00:56:40.694113 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/82c69aa6-374c-4143-a0d9-2c418c663f3b-node-certs\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694747 kubelet[1952]: I0515 00:56:40.694127 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-net-dir\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694747 kubelet[1952]: I0515 00:56:40.694138 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-log-dir\") pod \"calico-node-79g4s\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " pod="calico-system/calico-node-79g4s" May 15 00:56:40.694747 kubelet[1952]: I0515 00:56:40.694151 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c5fc9436-49d5-4858-9e14-f9808a9046d4-varrun\") pod \"csi-node-driver-8b5hz\" (UID: \"c5fc9436-49d5-4858-9e14-f9808a9046d4\") " pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:40.796470 kubelet[1952]: E0515 00:56:40.796438 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.796660 kubelet[1952]: W0515 00:56:40.796639 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.796785 kubelet[1952]: E0515 00:56:40.796748 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.797058 kubelet[1952]: E0515 00:56:40.797033 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.797145 kubelet[1952]: W0515 00:56:40.797127 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.797238 kubelet[1952]: E0515 00:56:40.797220 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.797454 kubelet[1952]: E0515 00:56:40.797442 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.797543 kubelet[1952]: W0515 00:56:40.797524 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.797638 kubelet[1952]: E0515 00:56:40.797620 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.797918 kubelet[1952]: E0515 00:56:40.797903 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.797918 kubelet[1952]: W0515 00:56:40.797916 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.798028 kubelet[1952]: E0515 00:56:40.797994 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.798116 kubelet[1952]: E0515 00:56:40.798104 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.798116 kubelet[1952]: W0515 00:56:40.798116 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.798219 kubelet[1952]: E0515 00:56:40.798129 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.798313 kubelet[1952]: E0515 00:56:40.798301 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.798396 kubelet[1952]: W0515 00:56:40.798380 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.798479 kubelet[1952]: E0515 00:56:40.798465 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.798741 kubelet[1952]: E0515 00:56:40.798722 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.798741 kubelet[1952]: W0515 00:56:40.798739 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.798874 kubelet[1952]: E0515 00:56:40.798858 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.799148 kubelet[1952]: E0515 00:56:40.799137 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.799223 kubelet[1952]: W0515 00:56:40.799207 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.799299 kubelet[1952]: E0515 00:56:40.799285 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.799548 kubelet[1952]: E0515 00:56:40.799538 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.799623 kubelet[1952]: W0515 00:56:40.799609 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.799705 kubelet[1952]: E0515 00:56:40.799692 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.799927 kubelet[1952]: E0515 00:56:40.799917 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.800005 kubelet[1952]: W0515 00:56:40.799990 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.800080 kubelet[1952]: E0515 00:56:40.800066 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.810837 kubelet[1952]: E0515 00:56:40.808010 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.810837 kubelet[1952]: W0515 00:56:40.808041 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.810837 kubelet[1952]: E0515 00:56:40.808062 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.810837 kubelet[1952]: E0515 00:56:40.809503 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.810837 kubelet[1952]: W0515 00:56:40.809515 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.810837 kubelet[1952]: E0515 00:56:40.809536 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.810837 kubelet[1952]: E0515 00:56:40.810209 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.810837 kubelet[1952]: W0515 00:56:40.810222 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.810837 kubelet[1952]: E0515 00:56:40.810236 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.812830 kubelet[1952]: E0515 00:56:40.812523 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:56:40.812830 kubelet[1952]: W0515 00:56:40.812537 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:56:40.812830 kubelet[1952]: E0515 00:56:40.812550 1952 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:56:40.899923 kubelet[1952]: E0515 00:56:40.899881 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:40.900433 env[1201]: time="2025-05-15T00:56:40.900393599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8578ffc444-phm54,Uid:7345ae31-068b-495f-b23d-6b6d8c81b83d,Namespace:calico-system,Attempt:0,}" May 15 00:56:40.908030 kubelet[1952]: E0515 00:56:40.908004 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:40.908405 env[1201]: time="2025-05-15T00:56:40.908353689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-79g4s,Uid:82c69aa6-374c-4143-a0d9-2c418c663f3b,Namespace:calico-system,Attempt:0,}" May 15 00:56:40.921685 env[1201]: time="2025-05-15T00:56:40.921576794Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:40.921685 env[1201]: time="2025-05-15T00:56:40.921607498Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:40.921685 env[1201]: time="2025-05-15T00:56:40.921616696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:40.922089 env[1201]: time="2025-05-15T00:56:40.922027323Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0fd76414e7efdc4f3007de3dd28eefde35ef6843eb7b4ebd47489061789f8d20 pid=2359 runtime=io.containerd.runc.v2 May 15 00:56:40.924215 env[1201]: time="2025-05-15T00:56:40.924148739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:56:40.924215 env[1201]: time="2025-05-15T00:56:40.924194514Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:56:40.924301 env[1201]: time="2025-05-15T00:56:40.924207561Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:56:40.924396 env[1201]: time="2025-05-15T00:56:40.924357941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49 pid=2375 runtime=io.containerd.runc.v2 May 15 00:56:40.931629 systemd[1]: Started cri-containerd-0fd76414e7efdc4f3007de3dd28eefde35ef6843eb7b4ebd47489061789f8d20.scope. May 15 00:56:40.939034 systemd[1]: Started cri-containerd-55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49.scope. May 15 00:56:40.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit: BPF prog-id=118 op=LOAD May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2359 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643736343134653765666463346633303037646533646432386565 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2359 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643736343134653765666463346633303037646533646432386565 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit: BPF prog-id=119 op=LOAD May 15 00:56:40.945000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023c520 items=0 ppid=2359 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643736343134653765666463346633303037646533646432386565 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.945000 audit: BPF prog-id=120 op=LOAD May 15 00:56:40.945000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023c568 items=0 ppid=2359 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643736343134653765666463346633303037646533646432386565 May 15 00:56:40.945000 audit: BPF prog-id=120 op=UNLOAD May 15 00:56:40.945000 audit: BPF prog-id=119 op=UNLOAD May 15 00:56:40.946000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.946000 audit: BPF prog-id=121 op=LOAD May 15 00:56:40.946000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023c978 items=0 ppid=2359 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643736343134653765666463346633303037646533646432386565 May 15 00:56:40.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit: BPF prog-id=122 op=LOAD May 15 00:56:40.947000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2375 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633064646330313938626635323265383235306335363764363333 May 15 00:56:40.947000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.947000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2375 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633064646330313938626635323265383235306335363764363333 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit: BPF prog-id=123 op=LOAD May 15 00:56:40.948000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fcfe0 items=0 ppid=2375 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633064646330313938626635323265383235306335363764363333 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit: BPF prog-id=124 op=LOAD May 15 00:56:40.948000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fd028 items=0 ppid=2375 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633064646330313938626635323265383235306335363764363333 May 15 00:56:40.948000 audit: BPF prog-id=124 op=UNLOAD May 15 00:56:40.948000 audit: BPF prog-id=123 op=UNLOAD May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:40.948000 audit: BPF prog-id=125 op=LOAD May 15 00:56:40.948000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fd438 items=0 ppid=2375 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:40.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633064646330313938626635323265383235306335363764363333 May 15 00:56:40.957048 env[1201]: time="2025-05-15T00:56:40.957014864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-79g4s,Uid:82c69aa6-374c-4143-a0d9-2c418c663f3b,Namespace:calico-system,Attempt:0,} returns sandbox id \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\"" May 15 00:56:40.958206 kubelet[1952]: E0515 00:56:40.957804 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:40.958927 env[1201]: time="2025-05-15T00:56:40.958774693Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 00:56:40.971721 env[1201]: time="2025-05-15T00:56:40.971671186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8578ffc444-phm54,Uid:7345ae31-068b-495f-b23d-6b6d8c81b83d,Namespace:calico-system,Attempt:0,} returns sandbox id \"0fd76414e7efdc4f3007de3dd28eefde35ef6843eb7b4ebd47489061789f8d20\"" May 15 00:56:40.972275 kubelet[1952]: E0515 00:56:40.972254 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:41.407000 audit[2430]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:41.407000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcd0731570 a2=0 a3=7ffcd073155c items=0 ppid=2140 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:41.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:41.414000 audit[2430]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:56:41.414000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd0731570 a2=0 a3=0 items=0 ppid=2140 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:41.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:56:42.414459 kubelet[1952]: E0515 00:56:42.414390 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:42.486148 env[1201]: time="2025-05-15T00:56:42.486077369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:42.488956 env[1201]: time="2025-05-15T00:56:42.488928186Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:42.490984 env[1201]: time="2025-05-15T00:56:42.490941202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:42.493096 env[1201]: time="2025-05-15T00:56:42.493071477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:42.493606 env[1201]: time="2025-05-15T00:56:42.493572491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 00:56:42.494756 env[1201]: time="2025-05-15T00:56:42.494738865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 00:56:42.496203 env[1201]: time="2025-05-15T00:56:42.496115650Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:56:42.511180 env[1201]: time="2025-05-15T00:56:42.511110253Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360\"" May 15 00:56:42.511937 env[1201]: time="2025-05-15T00:56:42.511898966Z" level=info msg="StartContainer for \"aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360\"" May 15 00:56:42.534723 systemd[1]: Started cri-containerd-aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360.scope. May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f80ac22d718 items=0 ppid=2375 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:42.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653435663431383635313531383830373166333539646463613463 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit: BPF prog-id=126 op=LOAD May 15 00:56:42.549000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00020aaf8 items=0 ppid=2375 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:42.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653435663431383635313531383830373166333539646463613463 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit: BPF prog-id=127 op=LOAD May 15 00:56:42.549000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00020ab48 items=0 ppid=2375 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:42.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653435663431383635313531383830373166333539646463613463 May 15 00:56:42.549000 audit: BPF prog-id=127 op=UNLOAD May 15 00:56:42.549000 audit: BPF prog-id=126 op=UNLOAD May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:42.549000 audit: BPF prog-id=128 op=LOAD May 15 00:56:42.549000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00020abd8 items=0 ppid=2375 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:42.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653435663431383635313531383830373166333539646463613463 May 15 00:56:42.563187 env[1201]: time="2025-05-15T00:56:42.563146732Z" level=info msg="StartContainer for \"aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360\" returns successfully" May 15 00:56:42.570559 systemd[1]: cri-containerd-aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360.scope: Deactivated successfully. May 15 00:56:42.576000 audit: BPF prog-id=128 op=UNLOAD May 15 00:56:42.577871 kernel: kauditd_printk_skb: 222 callbacks suppressed May 15 00:56:42.577921 kernel: audit: type=1334 audit(1747270602.576:972): prog-id=128 op=UNLOAD May 15 00:56:42.650398 env[1201]: time="2025-05-15T00:56:42.650325031Z" level=info msg="shim disconnected" id=aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360 May 15 00:56:42.650398 env[1201]: time="2025-05-15T00:56:42.650377027Z" level=warning msg="cleaning up after shim disconnected" id=aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360 namespace=k8s.io May 15 00:56:42.650398 env[1201]: time="2025-05-15T00:56:42.650392649Z" level=info msg="cleaning up dead shim" May 15 00:56:42.657414 env[1201]: time="2025-05-15T00:56:42.657352127Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:56:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2476 runtime=io.containerd.runc.v2\n" May 15 00:56:42.800397 systemd[1]: run-containerd-runc-k8s.io-aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360-runc.XBQleG.mount: Deactivated successfully. May 15 00:56:42.800491 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360-rootfs.mount: Deactivated successfully. May 15 00:56:43.105822 update_engine[1189]: I0515 00:56:43.105754 1189 update_attempter.cc:509] Updating boot flags... May 15 00:56:43.469902 kubelet[1952]: E0515 00:56:43.469563 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:44.414359 kubelet[1952]: E0515 00:56:44.414299 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:45.210417 env[1201]: time="2025-05-15T00:56:45.210375670Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:45.212704 env[1201]: time="2025-05-15T00:56:45.212662902Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:45.214485 env[1201]: time="2025-05-15T00:56:45.214459272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:45.216435 env[1201]: time="2025-05-15T00:56:45.216400424Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:45.216643 env[1201]: time="2025-05-15T00:56:45.216622042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 00:56:45.218712 env[1201]: time="2025-05-15T00:56:45.218686074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 00:56:45.224321 env[1201]: time="2025-05-15T00:56:45.223223462Z" level=info msg="CreateContainer within sandbox \"0fd76414e7efdc4f3007de3dd28eefde35ef6843eb7b4ebd47489061789f8d20\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 00:56:45.249074 env[1201]: time="2025-05-15T00:56:45.249017165Z" level=info msg="CreateContainer within sandbox \"0fd76414e7efdc4f3007de3dd28eefde35ef6843eb7b4ebd47489061789f8d20\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"500200b459acc5a1b951a0726f2df9ee6c61ede9f9f5da2b7dba478d6d18c2b5\"" May 15 00:56:45.249799 env[1201]: time="2025-05-15T00:56:45.249752962Z" level=info msg="StartContainer for \"500200b459acc5a1b951a0726f2df9ee6c61ede9f9f5da2b7dba478d6d18c2b5\"" May 15 00:56:45.267427 systemd[1]: Started cri-containerd-500200b459acc5a1b951a0726f2df9ee6c61ede9f9f5da2b7dba478d6d18c2b5.scope. May 15 00:56:45.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.284569 kernel: audit: type=1400 audit(1747270605.276:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.284635 kernel: audit: type=1400 audit(1747270605.276:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.284655 kernel: audit: type=1400 audit(1747270605.276:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.290286 kernel: audit: type=1400 audit(1747270605.276:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.293613 kernel: audit: type=1400 audit(1747270605.276:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.300399 kernel: audit: type=1400 audit(1747270605.276:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.300447 kernel: audit: type=1400 audit(1747270605.276:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.300538 kernel: audit: type=1400 audit(1747270605.276:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.306431 kernel: audit: type=1400 audit(1747270605.276:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit: BPF prog-id=129 op=LOAD May 15 00:56:45.280000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2359 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530303230306234353961636335613162393531613037323666326466 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2359 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530303230306234353961636335613162393531613037323666326466 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.280000 audit: BPF prog-id=130 op=LOAD May 15 00:56:45.280000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a660 items=0 ppid=2359 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:45.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530303230306234353961636335613162393531613037323666326466 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.282000 audit: BPF prog-id=131 op=LOAD May 15 00:56:45.282000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028a6a8 items=0 ppid=2359 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:45.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530303230306234353961636335613162393531613037323666326466 May 15 00:56:45.286000 audit: BPF prog-id=131 op=UNLOAD May 15 00:56:45.286000 audit: BPF prog-id=130 op=UNLOAD May 15 00:56:45.286000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:45.286000 audit: BPF prog-id=132 op=LOAD May 15 00:56:45.286000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028aab8 items=0 ppid=2359 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:45.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530303230306234353961636335613162393531613037323666326466 May 15 00:56:45.362525 env[1201]: time="2025-05-15T00:56:45.362477370Z" level=info msg="StartContainer for \"500200b459acc5a1b951a0726f2df9ee6c61ede9f9f5da2b7dba478d6d18c2b5\" returns successfully" May 15 00:56:45.473815 kubelet[1952]: E0515 00:56:45.473698 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:45.572830 kubelet[1952]: I0515 00:56:45.572747 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8578ffc444-phm54" podStartSLOduration=1.327791925 podStartE2EDuration="5.572730397s" podCreationTimestamp="2025-05-15 00:56:40 +0000 UTC" firstStartedPulling="2025-05-15 00:56:40.972857292 +0000 UTC m=+13.628731427" lastFinishedPulling="2025-05-15 00:56:45.217795764 +0000 UTC m=+17.873669899" observedRunningTime="2025-05-15 00:56:45.572329647 +0000 UTC m=+18.228203783" watchObservedRunningTime="2025-05-15 00:56:45.572730397 +0000 UTC m=+18.228604532" May 15 00:56:46.414299 kubelet[1952]: E0515 00:56:46.414221 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:46.475021 kubelet[1952]: I0515 00:56:46.474972 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 00:56:46.475363 kubelet[1952]: E0515 00:56:46.475285 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:48.414879 kubelet[1952]: E0515 00:56:48.414816 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:50.414102 kubelet[1952]: E0515 00:56:50.414037 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:52.024582 env[1201]: time="2025-05-15T00:56:52.024517220Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:52.027701 env[1201]: time="2025-05-15T00:56:52.027633001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:52.029955 env[1201]: time="2025-05-15T00:56:52.029917616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:52.031998 env[1201]: time="2025-05-15T00:56:52.031966304Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:56:52.032583 env[1201]: time="2025-05-15T00:56:52.032539269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 00:56:52.034629 env[1201]: time="2025-05-15T00:56:52.034592636Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:56:52.049131 env[1201]: time="2025-05-15T00:56:52.049082125Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20\"" May 15 00:56:52.049709 env[1201]: time="2025-05-15T00:56:52.049649178Z" level=info msg="StartContainer for \"ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20\"" May 15 00:56:52.064726 systemd[1]: run-containerd-runc-k8s.io-ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20-runc.WxcFRL.mount: Deactivated successfully. May 15 00:56:52.066849 systemd[1]: Started cri-containerd-ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20.scope. May 15 00:56:52.077000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.080002 kernel: kauditd_printk_skb: 48 callbacks suppressed May 15 00:56:52.080049 kernel: audit: type=1400 audit(1747270612.077:991): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.077000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b8264c5a8 items=0 ppid=2375 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.087441 kernel: audit: type=1300 audit(1747270612.077:991): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b8264c5a8 items=0 ppid=2375 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.087493 kernel: audit: type=1327 audit(1747270612.077:991): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363663530666130396236366634663464623332313465633330313663 May 15 00:56:52.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363663530666130396236366634663464623332313465633330313663 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.094262 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.094307 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.100051 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.100092 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.102971 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.109808 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.113246 kernel: audit: type=1400 audit(1747270612.078:992): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.078000 audit: BPF prog-id=133 op=LOAD May 15 00:56:52.078000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000273ba8 items=0 ppid=2375 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363663530666130396236366634663464623332313465633330313663 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.081000 audit: BPF prog-id=134 op=LOAD May 15 00:56:52.081000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000273bf8 items=0 ppid=2375 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363663530666130396236366634663464623332313465633330313663 May 15 00:56:52.089000 audit: BPF prog-id=134 op=UNLOAD May 15 00:56:52.089000 audit: BPF prog-id=133 op=UNLOAD May 15 00:56:52.089000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:56:52.089000 audit: BPF prog-id=135 op=LOAD May 15 00:56:52.089000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000273c88 items=0 ppid=2375 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363663530666130396236366634663464623332313465633330313663 May 15 00:56:52.114499 env[1201]: time="2025-05-15T00:56:52.114433413Z" level=info msg="StartContainer for \"ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20\" returns successfully" May 15 00:56:52.414023 kubelet[1952]: E0515 00:56:52.413921 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:52.484592 kubelet[1952]: E0515 00:56:52.484557 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:52.565007 systemd[1]: Started sshd@7-10.0.0.118:22-10.0.0.1:54740.service. May 15 00:56:52.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:54740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:52.861000 audit[2587]: USER_ACCT pid=2587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:52.863815 sshd[2587]: Accepted publickey for core from 10.0.0.1 port 54740 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:52.862000 audit[2587]: CRED_ACQ pid=2587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:52.863000 audit[2587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff17eb4310 a2=3 a3=0 items=0 ppid=1 pid=2587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:52.865206 sshd[2587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:52.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:56:52.869571 systemd-logind[1187]: New session 8 of user core. May 15 00:56:52.870674 systemd[1]: Started session-8.scope. May 15 00:56:52.873000 audit[2587]: USER_START pid=2587 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:52.875000 audit[2590]: CRED_ACQ pid=2590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:53.002520 sshd[2587]: pam_unix(sshd:session): session closed for user core May 15 00:56:53.001000 audit[2587]: USER_END pid=2587 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:53.001000 audit[2587]: CRED_DISP pid=2587 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:53.005071 systemd[1]: sshd@7-10.0.0.118:22-10.0.0.1:54740.service: Deactivated successfully. May 15 00:56:53.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:54740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:53.005890 systemd[1]: session-8.scope: Deactivated successfully. May 15 00:56:53.006808 systemd-logind[1187]: Session 8 logged out. Waiting for processes to exit. May 15 00:56:53.007557 systemd-logind[1187]: Removed session 8. May 15 00:56:53.345975 systemd[1]: cri-containerd-ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20.scope: Deactivated successfully. May 15 00:56:53.349000 audit: BPF prog-id=135 op=UNLOAD May 15 00:56:53.362250 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20-rootfs.mount: Deactivated successfully. May 15 00:56:53.388751 env[1201]: time="2025-05-15T00:56:53.388710526Z" level=info msg="shim disconnected" id=ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20 May 15 00:56:53.389044 env[1201]: time="2025-05-15T00:56:53.388752539Z" level=warning msg="cleaning up after shim disconnected" id=ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20 namespace=k8s.io May 15 00:56:53.389044 env[1201]: time="2025-05-15T00:56:53.388821475Z" level=info msg="cleaning up dead shim" May 15 00:56:53.394961 env[1201]: time="2025-05-15T00:56:53.394915278Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:56:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2614 runtime=io.containerd.runc.v2\n" May 15 00:56:53.398629 kubelet[1952]: I0515 00:56:53.398586 1952 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 00:56:53.436347 systemd[1]: Created slice kubepods-burstable-pod628d39ea_73a2_4f12_a393_62eacd958aa6.slice. May 15 00:56:53.442861 systemd[1]: Created slice kubepods-besteffort-pod0a5535c4_986f_4643_a53c_ec6f9f2e8c64.slice. May 15 00:56:53.448172 systemd[1]: Created slice kubepods-besteffort-pod845cb051_99b7_48ea_80e1_d20868b4ea6a.slice. May 15 00:56:53.456232 systemd[1]: Created slice kubepods-besteffort-podde5f883d_944b_478c_823a_9f80a77fd7ec.slice. May 15 00:56:53.459695 systemd[1]: Created slice kubepods-burstable-pod1938aa66_e571_4496_bebb_744c342d6aef.slice. May 15 00:56:53.481704 kubelet[1952]: I0515 00:56:53.481650 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nb6cr\" (UniqueName: \"kubernetes.io/projected/845cb051-99b7-48ea-80e1-d20868b4ea6a-kube-api-access-nb6cr\") pod \"calico-apiserver-59645c89cd-hr7vc\" (UID: \"845cb051-99b7-48ea-80e1-d20868b4ea6a\") " pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" May 15 00:56:53.481704 kubelet[1952]: I0515 00:56:53.481693 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/845cb051-99b7-48ea-80e1-d20868b4ea6a-calico-apiserver-certs\") pod \"calico-apiserver-59645c89cd-hr7vc\" (UID: \"845cb051-99b7-48ea-80e1-d20868b4ea6a\") " pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" May 15 00:56:53.481704 kubelet[1952]: I0515 00:56:53.481710 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1938aa66-e571-4496-bebb-744c342d6aef-config-volume\") pod \"coredns-668d6bf9bc-vql69\" (UID: \"1938aa66-e571-4496-bebb-744c342d6aef\") " pod="kube-system/coredns-668d6bf9bc-vql69" May 15 00:56:53.481704 kubelet[1952]: I0515 00:56:53.481723 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-krs5v\" (UniqueName: \"kubernetes.io/projected/de5f883d-944b-478c-823a-9f80a77fd7ec-kube-api-access-krs5v\") pod \"calico-kube-controllers-55fd84bbd9-6tkvx\" (UID: \"de5f883d-944b-478c-823a-9f80a77fd7ec\") " pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" May 15 00:56:53.482160 kubelet[1952]: I0515 00:56:53.481741 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tns4t\" (UniqueName: \"kubernetes.io/projected/0a5535c4-986f-4643-a53c-ec6f9f2e8c64-kube-api-access-tns4t\") pod \"calico-apiserver-59645c89cd-q6ptv\" (UID: \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\") " pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" May 15 00:56:53.482160 kubelet[1952]: I0515 00:56:53.481756 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/de5f883d-944b-478c-823a-9f80a77fd7ec-tigera-ca-bundle\") pod \"calico-kube-controllers-55fd84bbd9-6tkvx\" (UID: \"de5f883d-944b-478c-823a-9f80a77fd7ec\") " pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" May 15 00:56:53.482160 kubelet[1952]: I0515 00:56:53.481794 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n2rr2\" (UniqueName: \"kubernetes.io/projected/628d39ea-73a2-4f12-a393-62eacd958aa6-kube-api-access-n2rr2\") pod \"coredns-668d6bf9bc-2sdq7\" (UID: \"628d39ea-73a2-4f12-a393-62eacd958aa6\") " pod="kube-system/coredns-668d6bf9bc-2sdq7" May 15 00:56:53.482160 kubelet[1952]: I0515 00:56:53.481811 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0a5535c4-986f-4643-a53c-ec6f9f2e8c64-calico-apiserver-certs\") pod \"calico-apiserver-59645c89cd-q6ptv\" (UID: \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\") " pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" May 15 00:56:53.482160 kubelet[1952]: I0515 00:56:53.481877 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/628d39ea-73a2-4f12-a393-62eacd958aa6-config-volume\") pod \"coredns-668d6bf9bc-2sdq7\" (UID: \"628d39ea-73a2-4f12-a393-62eacd958aa6\") " pod="kube-system/coredns-668d6bf9bc-2sdq7" May 15 00:56:53.482288 kubelet[1952]: I0515 00:56:53.481914 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g9j2s\" (UniqueName: \"kubernetes.io/projected/1938aa66-e571-4496-bebb-744c342d6aef-kube-api-access-g9j2s\") pod \"coredns-668d6bf9bc-vql69\" (UID: \"1938aa66-e571-4496-bebb-744c342d6aef\") " pod="kube-system/coredns-668d6bf9bc-vql69" May 15 00:56:53.487101 kubelet[1952]: E0515 00:56:53.487081 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:53.487730 env[1201]: time="2025-05-15T00:56:53.487697181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 00:56:53.739524 kubelet[1952]: E0515 00:56:53.739404 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:53.740735 env[1201]: time="2025-05-15T00:56:53.740699502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-2sdq7,Uid:628d39ea-73a2-4f12-a393-62eacd958aa6,Namespace:kube-system,Attempt:0,}" May 15 00:56:53.746154 env[1201]: time="2025-05-15T00:56:53.745967974Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-q6ptv,Uid:0a5535c4-986f-4643-a53c-ec6f9f2e8c64,Namespace:calico-apiserver,Attempt:0,}" May 15 00:56:53.753629 env[1201]: time="2025-05-15T00:56:53.753603845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-hr7vc,Uid:845cb051-99b7-48ea-80e1-d20868b4ea6a,Namespace:calico-apiserver,Attempt:0,}" May 15 00:56:53.759381 env[1201]: time="2025-05-15T00:56:53.759343117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55fd84bbd9-6tkvx,Uid:de5f883d-944b-478c-823a-9f80a77fd7ec,Namespace:calico-system,Attempt:0,}" May 15 00:56:53.762660 kubelet[1952]: E0515 00:56:53.762639 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:56:53.763801 env[1201]: time="2025-05-15T00:56:53.763090122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vql69,Uid:1938aa66-e571-4496-bebb-744c342d6aef,Namespace:kube-system,Attempt:0,}" May 15 00:56:53.843047 env[1201]: time="2025-05-15T00:56:53.842952261Z" level=error msg="Failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.843829 env[1201]: time="2025-05-15T00:56:53.843754106Z" level=error msg="encountered an error cleaning up failed sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.843999 env[1201]: time="2025-05-15T00:56:53.843944853Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-2sdq7,Uid:628d39ea-73a2-4f12-a393-62eacd958aa6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.844253 kubelet[1952]: E0515 00:56:53.844202 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.844355 kubelet[1952]: E0515 00:56:53.844281 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-2sdq7" May 15 00:56:53.844355 kubelet[1952]: E0515 00:56:53.844301 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-2sdq7" May 15 00:56:53.844414 kubelet[1952]: E0515 00:56:53.844352 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-2sdq7_kube-system(628d39ea-73a2-4f12-a393-62eacd958aa6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-2sdq7_kube-system(628d39ea-73a2-4f12-a393-62eacd958aa6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-2sdq7" podUID="628d39ea-73a2-4f12-a393-62eacd958aa6" May 15 00:56:53.857558 env[1201]: time="2025-05-15T00:56:53.857489251Z" level=error msg="Failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.858184 env[1201]: time="2025-05-15T00:56:53.858151249Z" level=error msg="encountered an error cleaning up failed sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.858348 env[1201]: time="2025-05-15T00:56:53.858298480Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-q6ptv,Uid:0a5535c4-986f-4643-a53c-ec6f9f2e8c64,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.859002 kubelet[1952]: E0515 00:56:53.858652 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.859002 kubelet[1952]: E0515 00:56:53.858702 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" May 15 00:56:53.859002 kubelet[1952]: E0515 00:56:53.858726 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" May 15 00:56:53.859228 kubelet[1952]: E0515 00:56:53.858782 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-59645c89cd-q6ptv_calico-apiserver(0a5535c4-986f-4643-a53c-ec6f9f2e8c64)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-59645c89cd-q6ptv_calico-apiserver(0a5535c4-986f-4643-a53c-ec6f9f2e8c64)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podUID="0a5535c4-986f-4643-a53c-ec6f9f2e8c64" May 15 00:56:53.879032 env[1201]: time="2025-05-15T00:56:53.878967848Z" level=error msg="Failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879186 env[1201]: time="2025-05-15T00:56:53.879150499Z" level=error msg="Failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879376 env[1201]: time="2025-05-15T00:56:53.879347167Z" level=error msg="encountered an error cleaning up failed sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879441 env[1201]: time="2025-05-15T00:56:53.879400494Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-hr7vc,Uid:845cb051-99b7-48ea-80e1-d20868b4ea6a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879441 env[1201]: time="2025-05-15T00:56:53.879412667Z" level=error msg="encountered an error cleaning up failed sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879531 env[1201]: time="2025-05-15T00:56:53.879445662Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vql69,Uid:1938aa66-e571-4496-bebb-744c342d6aef,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879676 kubelet[1952]: E0515 00:56:53.879632 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879865 kubelet[1952]: E0515 00:56:53.879706 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-vql69" May 15 00:56:53.879865 kubelet[1952]: E0515 00:56:53.879734 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-vql69" May 15 00:56:53.879865 kubelet[1952]: E0515 00:56:53.879643 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.879976 env[1201]: time="2025-05-15T00:56:53.879743952Z" level=error msg="Failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.880010 kubelet[1952]: E0515 00:56:53.879810 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-vql69_kube-system(1938aa66-e571-4496-bebb-744c342d6aef)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-vql69_kube-system(1938aa66-e571-4496-bebb-744c342d6aef)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vql69" podUID="1938aa66-e571-4496-bebb-744c342d6aef" May 15 00:56:53.880010 kubelet[1952]: E0515 00:56:53.879815 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" May 15 00:56:53.880010 kubelet[1952]: E0515 00:56:53.879851 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" May 15 00:56:53.880213 env[1201]: time="2025-05-15T00:56:53.879989216Z" level=error msg="encountered an error cleaning up failed sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.880213 env[1201]: time="2025-05-15T00:56:53.880019606Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55fd84bbd9-6tkvx,Uid:de5f883d-944b-478c-823a-9f80a77fd7ec,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.880307 kubelet[1952]: E0515 00:56:53.879879 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-59645c89cd-hr7vc_calico-apiserver(845cb051-99b7-48ea-80e1-d20868b4ea6a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-59645c89cd-hr7vc_calico-apiserver(845cb051-99b7-48ea-80e1-d20868b4ea6a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" podUID="845cb051-99b7-48ea-80e1-d20868b4ea6a" May 15 00:56:53.880307 kubelet[1952]: E0515 00:56:53.880111 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:53.880307 kubelet[1952]: E0515 00:56:53.880131 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" May 15 00:56:53.880443 kubelet[1952]: E0515 00:56:53.880146 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" May 15 00:56:53.880443 kubelet[1952]: E0515 00:56:53.880200 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55fd84bbd9-6tkvx_calico-system(de5f883d-944b-478c-823a-9f80a77fd7ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55fd84bbd9-6tkvx_calico-system(de5f883d-944b-478c-823a-9f80a77fd7ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" podUID="de5f883d-944b-478c-823a-9f80a77fd7ec" May 15 00:56:54.420080 systemd[1]: Created slice kubepods-besteffort-podc5fc9436_49d5_4858_9e14_f9808a9046d4.slice. May 15 00:56:54.422071 env[1201]: time="2025-05-15T00:56:54.422034712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8b5hz,Uid:c5fc9436-49d5-4858-9e14-f9808a9046d4,Namespace:calico-system,Attempt:0,}" May 15 00:56:54.481346 env[1201]: time="2025-05-15T00:56:54.481277368Z" level=error msg="Failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.481682 env[1201]: time="2025-05-15T00:56:54.481645535Z" level=error msg="encountered an error cleaning up failed sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.481743 env[1201]: time="2025-05-15T00:56:54.481700793Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8b5hz,Uid:c5fc9436-49d5-4858-9e14-f9808a9046d4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.482002 kubelet[1952]: E0515 00:56:54.481965 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.483265 kubelet[1952]: E0515 00:56:54.483241 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:54.483346 kubelet[1952]: E0515 00:56:54.483278 1952 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8b5hz" May 15 00:56:54.483264 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e-shm.mount: Deactivated successfully. May 15 00:56:54.483480 kubelet[1952]: E0515 00:56:54.483334 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8b5hz_calico-system(c5fc9436-49d5-4858-9e14-f9808a9046d4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8b5hz_calico-system(c5fc9436-49d5-4858-9e14-f9808a9046d4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:54.494147 kubelet[1952]: I0515 00:56:54.494112 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:56:54.494700 env[1201]: time="2025-05-15T00:56:54.494662055Z" level=info msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\"" May 15 00:56:54.495189 kubelet[1952]: I0515 00:56:54.495105 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:56:54.495926 env[1201]: time="2025-05-15T00:56:54.495885528Z" level=info msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\"" May 15 00:56:54.496408 kubelet[1952]: I0515 00:56:54.496379 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:56:54.496823 env[1201]: time="2025-05-15T00:56:54.496794330Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" May 15 00:56:54.498034 kubelet[1952]: I0515 00:56:54.497560 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:56:54.498238 env[1201]: time="2025-05-15T00:56:54.498220022Z" level=info msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\"" May 15 00:56:54.498362 kubelet[1952]: I0515 00:56:54.498341 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:56:54.499097 env[1201]: time="2025-05-15T00:56:54.499069648Z" level=info msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\"" May 15 00:56:54.500732 kubelet[1952]: I0515 00:56:54.500707 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:56:54.501276 env[1201]: time="2025-05-15T00:56:54.501237363Z" level=info msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\"" May 15 00:56:54.566004 env[1201]: time="2025-05-15T00:56:54.565932272Z" level=error msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" failed" error="failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.566293 env[1201]: time="2025-05-15T00:56:54.566183166Z" level=error msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\" failed" error="failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.566491 kubelet[1952]: E0515 00:56:54.566455 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:56:54.566589 kubelet[1952]: E0515 00:56:54.566515 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322"} May 15 00:56:54.566589 kubelet[1952]: E0515 00:56:54.566570 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:56:54.566700 kubelet[1952]: E0515 00:56:54.566604 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podUID="0a5535c4-986f-4643-a53c-ec6f9f2e8c64" May 15 00:56:54.566700 kubelet[1952]: E0515 00:56:54.566650 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:56:54.566700 kubelet[1952]: E0515 00:56:54.566665 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b"} May 15 00:56:54.566700 kubelet[1952]: E0515 00:56:54.566682 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:56:54.566901 kubelet[1952]: E0515 00:56:54.566694 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vql69" podUID="1938aa66-e571-4496-bebb-744c342d6aef" May 15 00:56:54.583809 env[1201]: time="2025-05-15T00:56:54.583730152Z" level=error msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\" failed" error="failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.584217 kubelet[1952]: E0515 00:56:54.584178 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:56:54.584314 kubelet[1952]: E0515 00:56:54.584230 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b"} May 15 00:56:54.584314 kubelet[1952]: E0515 00:56:54.584262 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:56:54.584314 kubelet[1952]: E0515 00:56:54.584283 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-2sdq7" podUID="628d39ea-73a2-4f12-a393-62eacd958aa6" May 15 00:56:54.596018 env[1201]: time="2025-05-15T00:56:54.595961815Z" level=error msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\" failed" error="failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.596292 kubelet[1952]: E0515 00:56:54.596232 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:56:54.596377 kubelet[1952]: E0515 00:56:54.596310 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e"} May 15 00:56:54.596377 kubelet[1952]: E0515 00:56:54.596356 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:56:54.596474 kubelet[1952]: E0515 00:56:54.596388 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:56:54.596644 env[1201]: time="2025-05-15T00:56:54.596588320Z" level=error msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\" failed" error="failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.596820 kubelet[1952]: E0515 00:56:54.596787 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:56:54.596890 kubelet[1952]: E0515 00:56:54.596824 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe"} May 15 00:56:54.596890 kubelet[1952]: E0515 00:56:54.596853 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:56:54.596961 kubelet[1952]: E0515 00:56:54.596880 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" podUID="845cb051-99b7-48ea-80e1-d20868b4ea6a" May 15 00:56:54.598128 env[1201]: time="2025-05-15T00:56:54.598062787Z" level=error msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\" failed" error="failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:56:54.598297 kubelet[1952]: E0515 00:56:54.598265 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:56:54.598353 kubelet[1952]: E0515 00:56:54.598312 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6"} May 15 00:56:54.598353 kubelet[1952]: E0515 00:56:54.598342 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:56:54.598431 kubelet[1952]: E0515 00:56:54.598366 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" podUID="de5f883d-944b-478c-823a-9f80a77fd7ec" May 15 00:56:58.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:58898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:58.007077 systemd[1]: Started sshd@8-10.0.0.118:22-10.0.0.1:58898.service. May 15 00:56:58.013004 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 00:56:58.013098 kernel: audit: type=1130 audit(1747270618.006:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:58898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:58.049000 audit[3005]: USER_ACCT pid=3005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.054262 sshd[3005]: Accepted publickey for core from 10.0.0.1 port 58898 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:56:58.053000 audit[3005]: CRED_ACQ pid=3005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.054940 sshd[3005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:56:58.066431 kernel: audit: type=1101 audit(1747270618.049:1008): pid=3005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.066479 kernel: audit: type=1103 audit(1747270618.053:1009): pid=3005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.066509 kernel: audit: type=1006 audit(1747270618.053:1010): pid=3005 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 00:56:58.066526 kernel: audit: type=1300 audit(1747270618.053:1010): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd1498b0 a2=3 a3=0 items=0 ppid=1 pid=3005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.066542 kernel: audit: type=1327 audit(1747270618.053:1010): proctitle=737368643A20636F7265205B707269765D May 15 00:56:58.053000 audit[3005]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd1498b0 a2=3 a3=0 items=0 ppid=1 pid=3005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:56:58.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:56:58.059870 systemd[1]: Started session-9.scope. May 15 00:56:58.060411 systemd-logind[1187]: New session 9 of user core. May 15 00:56:58.075106 kernel: audit: type=1105 audit(1747270618.064:1011): pid=3005 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.075149 kernel: audit: type=1103 audit(1747270618.066:1012): pid=3007 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.064000 audit[3005]: USER_START pid=3005 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.066000 audit[3007]: CRED_ACQ pid=3007 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.178971 sshd[3005]: pam_unix(sshd:session): session closed for user core May 15 00:56:58.187557 kernel: audit: type=1106 audit(1747270618.178:1013): pid=3005 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.187617 kernel: audit: type=1104 audit(1747270618.179:1014): pid=3005 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.178000 audit[3005]: USER_END pid=3005 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.179000 audit[3005]: CRED_DISP pid=3005 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:56:58.181135 systemd[1]: sshd@8-10.0.0.118:22-10.0.0.1:58898.service: Deactivated successfully. May 15 00:56:58.181748 systemd[1]: session-9.scope: Deactivated successfully. May 15 00:56:58.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:58898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:56:58.188399 systemd-logind[1187]: Session 9 logged out. Waiting for processes to exit. May 15 00:56:58.189116 systemd-logind[1187]: Removed session 9. May 15 00:57:01.306392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3632160354.mount: Deactivated successfully. May 15 00:57:01.992793 kubelet[1952]: I0515 00:57:01.992422 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 00:57:01.994159 kubelet[1952]: E0515 00:57:01.993399 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:02.013138 env[1201]: time="2025-05-15T00:57:02.013090788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:02.016409 env[1201]: time="2025-05-15T00:57:02.016363070Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:02.018127 env[1201]: time="2025-05-15T00:57:02.018101715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:02.020203 env[1201]: time="2025-05-15T00:57:02.020168220Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:02.020672 env[1201]: time="2025-05-15T00:57:02.020639989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 00:57:02.027193 env[1201]: time="2025-05-15T00:57:02.027148222Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:57:02.030000 audit[3022]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.030000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffca6fd67a0 a2=0 a3=7ffca6fd678c items=0 ppid=2140 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.030000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.036000 audit[3022]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.036000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca6fd67a0 a2=0 a3=0 items=0 ppid=2140 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.046000 audit[3025]: NETFILTER_CFG table=filter:97 family=2 entries=18 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.046000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd05bde0e0 a2=0 a3=7ffd05bde0cc items=0 ppid=2140 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.048538 env[1201]: time="2025-05-15T00:57:02.048490091Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3\"" May 15 00:57:02.049089 env[1201]: time="2025-05-15T00:57:02.049054901Z" level=info msg="StartContainer for \"839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3\"" May 15 00:57:02.051000 audit[3025]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:02.051000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd05bde0e0 a2=0 a3=0 items=0 ppid=2140 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:02.064993 systemd[1]: Started cri-containerd-839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3.scope. May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb3e9a96228 items=0 ppid=2375 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833396636333936616237393865333161366632656366383638646634 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit: BPF prog-id=136 op=LOAD May 15 00:57:02.077000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c5c88 items=0 ppid=2375 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833396636333936616237393865333161366632656366383638646634 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit: BPF prog-id=137 op=LOAD May 15 00:57:02.077000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c5cd8 items=0 ppid=2375 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833396636333936616237393865333161366632656366383638646634 May 15 00:57:02.077000 audit: BPF prog-id=137 op=UNLOAD May 15 00:57:02.077000 audit: BPF prog-id=136 op=UNLOAD May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.077000 audit: BPF prog-id=138 op=LOAD May 15 00:57:02.077000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002c5d68 items=0 ppid=2375 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833396636333936616237393865333161366632656366383638646634 May 15 00:57:02.091747 env[1201]: time="2025-05-15T00:57:02.091686256Z" level=info msg="StartContainer for \"839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3\" returns successfully" May 15 00:57:02.159425 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 00:57:02.159557 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 00:57:02.180227 systemd[1]: cri-containerd-839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3.scope: Deactivated successfully. May 15 00:57:02.184000 audit: BPF prog-id=138 op=UNLOAD May 15 00:57:02.306568 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3-rootfs.mount: Deactivated successfully. May 15 00:57:02.665862 env[1201]: time="2025-05-15T00:57:02.665810635Z" level=info msg="shim disconnected" id=839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3 May 15 00:57:02.665862 env[1201]: time="2025-05-15T00:57:02.665863368Z" level=warning msg="cleaning up after shim disconnected" id=839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3 namespace=k8s.io May 15 00:57:02.666116 env[1201]: time="2025-05-15T00:57:02.665878437Z" level=info msg="cleaning up dead shim" May 15 00:57:02.672752 env[1201]: time="2025-05-15T00:57:02.672685563Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3084 runtime=io.containerd.runc.v2\n" May 15 00:57:02.710867 kubelet[1952]: E0515 00:57:02.710829 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:02.710867 kubelet[1952]: I0515 00:57:02.710848 1952 scope.go:117] "RemoveContainer" containerID="839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3" May 15 00:57:02.711150 kubelet[1952]: E0515 00:57:02.710899 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:02.712735 env[1201]: time="2025-05-15T00:57:02.712693419Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 15 00:57:02.744324 env[1201]: time="2025-05-15T00:57:02.744244588Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a\"" May 15 00:57:02.744992 env[1201]: time="2025-05-15T00:57:02.744945843Z" level=info msg="StartContainer for \"3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a\"" May 15 00:57:02.763860 systemd[1]: Started cri-containerd-3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a.scope. May 15 00:57:02.777000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.777000 audit[3104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5ecc6029f8 items=0 ppid=2375 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666438633965323665373233333637643134333933326135653266 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit: BPF prog-id=139 op=LOAD May 15 00:57:02.778000 audit[3104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022f1d8 items=0 ppid=2375 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666438633965323665373233333637643134333933326135653266 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit: BPF prog-id=140 op=LOAD May 15 00:57:02.778000 audit[3104]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022f228 items=0 ppid=2375 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666438633965323665373233333637643134333933326135653266 May 15 00:57:02.778000 audit: BPF prog-id=140 op=UNLOAD May 15 00:57:02.778000 audit: BPF prog-id=139 op=UNLOAD May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { perfmon } for pid=3104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit[3104]: AVC avc: denied { bpf } for pid=3104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:02.778000 audit: BPF prog-id=141 op=LOAD May 15 00:57:02.778000 audit[3104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022f2b8 items=0 ppid=2375 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:02.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666438633965323665373233333637643134333933326135653266 May 15 00:57:02.791695 env[1201]: time="2025-05-15T00:57:02.791641102Z" level=info msg="StartContainer for \"3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a\" returns successfully" May 15 00:57:02.843535 systemd[1]: cri-containerd-3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a.scope: Deactivated successfully. May 15 00:57:02.847000 audit: BPF prog-id=141 op=UNLOAD May 15 00:57:02.868629 env[1201]: time="2025-05-15T00:57:02.868561097Z" level=info msg="shim disconnected" id=3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a May 15 00:57:02.868629 env[1201]: time="2025-05-15T00:57:02.868619551Z" level=warning msg="cleaning up after shim disconnected" id=3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a namespace=k8s.io May 15 00:57:02.868629 env[1201]: time="2025-05-15T00:57:02.868631734Z" level=info msg="cleaning up dead shim" May 15 00:57:02.874820 env[1201]: time="2025-05-15T00:57:02.874755770Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3150 runtime=io.containerd.runc.v2\n" May 15 00:57:03.062000 audit[3163]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:03.064592 kernel: kauditd_printk_skb: 101 callbacks suppressed May 15 00:57:03.064650 kernel: audit: type=1325 audit(1747270623.062:1034): table=filter:99 family=2 entries=17 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:03.062000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff7813a070 a2=0 a3=7fff7813a05c items=0 ppid=2140 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.074299 kernel: audit: type=1300 audit(1747270623.062:1034): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff7813a070 a2=0 a3=7fff7813a05c items=0 ppid=2140 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.074342 kernel: audit: type=1327 audit(1747270623.062:1034): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:03.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:03.082000 audit[3163]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:03.082000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff7813a070 a2=0 a3=7fff7813a05c items=0 ppid=2140 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.091835 kernel: audit: type=1325 audit(1747270623.082:1035): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:03.091881 kernel: audit: type=1300 audit(1747270623.082:1035): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff7813a070 a2=0 a3=7fff7813a05c items=0 ppid=2140 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.091902 kernel: audit: type=1327 audit(1747270623.082:1035): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:03.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:03.182925 systemd[1]: Started sshd@9-10.0.0.118:22-10.0.0.1:58904.service. May 15 00:57:03.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:03.188792 kernel: audit: type=1130 audit(1747270623.182:1036): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:03.225000 audit[3165]: USER_ACCT pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.226719 sshd[3165]: Accepted publickey for core from 10.0.0.1 port 58904 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:03.228286 sshd[3165]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:03.230790 kernel: audit: type=1101 audit(1747270623.225:1037): pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.227000 audit[3165]: CRED_ACQ pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.231929 systemd-logind[1187]: New session 10 of user core. May 15 00:57:03.232895 systemd[1]: Started session-10.scope. May 15 00:57:03.237827 kernel: audit: type=1103 audit(1747270623.227:1038): pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.237902 kernel: audit: type=1006 audit(1747270623.227:1039): pid=3165 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 00:57:03.227000 audit[3165]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca8d619f0 a2=3 a3=0 items=0 ppid=1 pid=3165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:03.227000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:03.236000 audit[3165]: USER_START pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.237000 audit[3167]: CRED_ACQ pid=3167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.307303 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a-rootfs.mount: Deactivated successfully. May 15 00:57:03.340305 sshd[3165]: pam_unix(sshd:session): session closed for user core May 15 00:57:03.340000 audit[3165]: USER_END pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.340000 audit[3165]: CRED_DISP pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:03.342652 systemd[1]: sshd@9-10.0.0.118:22-10.0.0.1:58904.service: Deactivated successfully. May 15 00:57:03.343294 systemd[1]: session-10.scope: Deactivated successfully. May 15 00:57:03.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:03.343853 systemd-logind[1187]: Session 10 logged out. Waiting for processes to exit. May 15 00:57:03.344545 systemd-logind[1187]: Removed session 10. May 15 00:57:03.713805 kubelet[1952]: I0515 00:57:03.713683 1952 scope.go:117] "RemoveContainer" containerID="839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3" May 15 00:57:03.714490 kubelet[1952]: I0515 00:57:03.713904 1952 scope.go:117] "RemoveContainer" containerID="3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a" May 15 00:57:03.714490 kubelet[1952]: E0515 00:57:03.713954 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:03.714490 kubelet[1952]: E0515 00:57:03.714036 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-79g4s_calico-system(82c69aa6-374c-4143-a0d9-2c418c663f3b)\"" pod="calico-system/calico-node-79g4s" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" May 15 00:57:03.714597 env[1201]: time="2025-05-15T00:57:03.714569348Z" level=info msg="RemoveContainer for \"839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3\"" May 15 00:57:03.757202 env[1201]: time="2025-05-15T00:57:03.756742194Z" level=info msg="RemoveContainer for \"839f6396ab798e31a6f2ecf868df49a040997ac925e043308d09a32d0ee976f3\" returns successfully" May 15 00:57:04.717421 kubelet[1952]: I0515 00:57:04.717390 1952 scope.go:117] "RemoveContainer" containerID="3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a" May 15 00:57:04.717795 kubelet[1952]: E0515 00:57:04.717461 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:04.717795 kubelet[1952]: E0515 00:57:04.717554 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-79g4s_calico-system(82c69aa6-374c-4143-a0d9-2c418c663f3b)\"" pod="calico-system/calico-node-79g4s" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" May 15 00:57:05.415174 env[1201]: time="2025-05-15T00:57:05.415130364Z" level=info msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\"" May 15 00:57:05.435318 env[1201]: time="2025-05-15T00:57:05.435248639Z" level=error msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\" failed" error="failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:05.435565 kubelet[1952]: E0515 00:57:05.435510 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:05.435613 kubelet[1952]: E0515 00:57:05.435578 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b"} May 15 00:57:05.435638 kubelet[1952]: E0515 00:57:05.435619 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:05.435712 kubelet[1952]: E0515 00:57:05.435648 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vql69" podUID="1938aa66-e571-4496-bebb-744c342d6aef" May 15 00:57:06.414404 env[1201]: time="2025-05-15T00:57:06.414352890Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" May 15 00:57:06.414575 env[1201]: time="2025-05-15T00:57:06.414352078Z" level=info msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\"" May 15 00:57:06.437787 env[1201]: time="2025-05-15T00:57:06.437705228Z" level=error msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\" failed" error="failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:06.438277 kubelet[1952]: E0515 00:57:06.437989 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:06.438277 kubelet[1952]: E0515 00:57:06.438054 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6"} May 15 00:57:06.438277 kubelet[1952]: E0515 00:57:06.438102 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:06.438277 kubelet[1952]: E0515 00:57:06.438129 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" podUID="de5f883d-944b-478c-823a-9f80a77fd7ec" May 15 00:57:06.440840 env[1201]: time="2025-05-15T00:57:06.440791953Z" level=error msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" failed" error="failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:06.441003 kubelet[1952]: E0515 00:57:06.440950 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:06.441062 kubelet[1952]: E0515 00:57:06.441002 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322"} May 15 00:57:06.441062 kubelet[1952]: E0515 00:57:06.441036 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:06.441175 kubelet[1952]: E0515 00:57:06.441062 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podUID="0a5535c4-986f-4643-a53c-ec6f9f2e8c64" May 15 00:57:08.344980 systemd[1]: Started sshd@10-10.0.0.118:22-10.0.0.1:38712.service. May 15 00:57:08.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:38712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.345977 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 00:57:08.346052 kernel: audit: type=1130 audit(1747270628.344:1045): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:38712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.385000 audit[3257]: USER_ACCT pid=3257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.386608 sshd[3257]: Accepted publickey for core from 10.0.0.1 port 38712 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:08.388282 sshd[3257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:08.387000 audit[3257]: CRED_ACQ pid=3257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.392249 systemd-logind[1187]: New session 11 of user core. May 15 00:57:08.393396 systemd[1]: Started session-11.scope. May 15 00:57:08.394201 kernel: audit: type=1101 audit(1747270628.385:1046): pid=3257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.394251 kernel: audit: type=1103 audit(1747270628.387:1047): pid=3257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.394278 kernel: audit: type=1006 audit(1747270628.387:1048): pid=3257 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 00:57:08.387000 audit[3257]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee9add960 a2=3 a3=0 items=0 ppid=1 pid=3257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:08.400998 kernel: audit: type=1300 audit(1747270628.387:1048): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee9add960 a2=3 a3=0 items=0 ppid=1 pid=3257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:08.401052 kernel: audit: type=1327 audit(1747270628.387:1048): proctitle=737368643A20636F7265205B707269765D May 15 00:57:08.387000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:08.397000 audit[3257]: USER_START pid=3257 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.407526 kernel: audit: type=1105 audit(1747270628.397:1049): pid=3257 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.407571 kernel: audit: type=1103 audit(1747270628.398:1050): pid=3259 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.398000 audit[3259]: CRED_ACQ pid=3259 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.500727 sshd[3257]: pam_unix(sshd:session): session closed for user core May 15 00:57:08.500000 audit[3257]: USER_END pid=3257 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.503596 systemd[1]: sshd@10-10.0.0.118:22-10.0.0.1:38712.service: Deactivated successfully. May 15 00:57:08.504127 systemd[1]: session-11.scope: Deactivated successfully. May 15 00:57:08.505518 systemd[1]: Started sshd@11-10.0.0.118:22-10.0.0.1:38718.service. May 15 00:57:08.501000 audit[3257]: CRED_DISP pid=3257 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.510045 kernel: audit: type=1106 audit(1747270628.500:1051): pid=3257 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.510100 kernel: audit: type=1104 audit(1747270628.501:1052): pid=3257 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:38712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:38718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.509667 systemd-logind[1187]: Session 11 logged out. Waiting for processes to exit. May 15 00:57:08.510585 systemd-logind[1187]: Removed session 11. May 15 00:57:08.546000 audit[3271]: USER_ACCT pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.547647 sshd[3271]: Accepted publickey for core from 10.0.0.1 port 38718 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:08.547000 audit[3271]: CRED_ACQ pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.547000 audit[3271]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb5d18b40 a2=3 a3=0 items=0 ppid=1 pid=3271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:08.547000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:08.548581 sshd[3271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:08.552279 systemd-logind[1187]: New session 12 of user core. May 15 00:57:08.553082 systemd[1]: Started session-12.scope. May 15 00:57:08.557000 audit[3271]: USER_START pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.558000 audit[3273]: CRED_ACQ pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.689150 sshd[3271]: pam_unix(sshd:session): session closed for user core May 15 00:57:08.689000 audit[3271]: USER_END pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.689000 audit[3271]: CRED_DISP pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:38718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.692661 systemd[1]: sshd@11-10.0.0.118:22-10.0.0.1:38718.service: Deactivated successfully. May 15 00:57:08.693378 systemd[1]: session-12.scope: Deactivated successfully. May 15 00:57:08.694099 systemd-logind[1187]: Session 12 logged out. Waiting for processes to exit. May 15 00:57:08.695748 systemd[1]: Started sshd@12-10.0.0.118:22-10.0.0.1:38722.service. May 15 00:57:08.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:38722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.697323 systemd-logind[1187]: Removed session 12. May 15 00:57:08.736000 audit[3283]: USER_ACCT pid=3283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.737441 sshd[3283]: Accepted publickey for core from 10.0.0.1 port 38722 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:08.737000 audit[3283]: CRED_ACQ pid=3283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.737000 audit[3283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc12b45d50 a2=3 a3=0 items=0 ppid=1 pid=3283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:08.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:08.738596 sshd[3283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:08.741869 systemd-logind[1187]: New session 13 of user core. May 15 00:57:08.742608 systemd[1]: Started session-13.scope. May 15 00:57:08.746000 audit[3283]: USER_START pid=3283 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.747000 audit[3285]: CRED_ACQ pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.852159 sshd[3283]: pam_unix(sshd:session): session closed for user core May 15 00:57:08.852000 audit[3283]: USER_END pid=3283 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.852000 audit[3283]: CRED_DISP pid=3283 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:08.854944 systemd[1]: sshd@12-10.0.0.118:22-10.0.0.1:38722.service: Deactivated successfully. May 15 00:57:08.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:38722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:08.855714 systemd[1]: session-13.scope: Deactivated successfully. May 15 00:57:08.856249 systemd-logind[1187]: Session 13 logged out. Waiting for processes to exit. May 15 00:57:08.856952 systemd-logind[1187]: Removed session 13. May 15 00:57:09.416129 env[1201]: time="2025-05-15T00:57:09.415659169Z" level=info msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\"" May 15 00:57:09.416575 env[1201]: time="2025-05-15T00:57:09.416205195Z" level=info msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\"" May 15 00:57:09.436758 env[1201]: time="2025-05-15T00:57:09.436680792Z" level=error msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\" failed" error="failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:09.436997 kubelet[1952]: E0515 00:57:09.436952 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:09.437247 kubelet[1952]: E0515 00:57:09.437008 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe"} May 15 00:57:09.437247 kubelet[1952]: E0515 00:57:09.437042 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:09.437247 kubelet[1952]: E0515 00:57:09.437062 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" podUID="845cb051-99b7-48ea-80e1-d20868b4ea6a" May 15 00:57:09.442116 env[1201]: time="2025-05-15T00:57:09.442064925Z" level=error msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\" failed" error="failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:09.442325 kubelet[1952]: E0515 00:57:09.442301 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:09.442376 kubelet[1952]: E0515 00:57:09.442330 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e"} May 15 00:57:09.442376 kubelet[1952]: E0515 00:57:09.442350 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:09.442376 kubelet[1952]: E0515 00:57:09.442370 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:57:10.414589 env[1201]: time="2025-05-15T00:57:10.414541711Z" level=info msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\"" May 15 00:57:10.438451 env[1201]: time="2025-05-15T00:57:10.438377752Z" level=error msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\" failed" error="failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:10.438781 kubelet[1952]: E0515 00:57:10.438645 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:10.438781 kubelet[1952]: E0515 00:57:10.438717 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b"} May 15 00:57:10.438781 kubelet[1952]: E0515 00:57:10.438749 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:10.439051 kubelet[1952]: E0515 00:57:10.438783 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-2sdq7" podUID="628d39ea-73a2-4f12-a393-62eacd958aa6" May 15 00:57:13.857068 systemd[1]: Started sshd@13-10.0.0.118:22-10.0.0.1:38736.service. May 15 00:57:13.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:38736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:13.858101 kernel: kauditd_printk_skb: 23 callbacks suppressed May 15 00:57:13.858151 kernel: audit: type=1130 audit(1747270633.856:1072): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:38736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:13.898000 audit[3370]: USER_ACCT pid=3370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.899072 sshd[3370]: Accepted publickey for core from 10.0.0.1 port 38736 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:13.903244 sshd[3370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:13.907133 systemd[1]: Started session-14.scope. May 15 00:57:13.907509 systemd-logind[1187]: New session 14 of user core. May 15 00:57:13.902000 audit[3370]: CRED_ACQ pid=3370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.914908 kernel: audit: type=1101 audit(1747270633.898:1073): pid=3370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.914964 kernel: audit: type=1103 audit(1747270633.902:1074): pid=3370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.914990 kernel: audit: type=1006 audit(1747270633.902:1075): pid=3370 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 00:57:13.902000 audit[3370]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2dcae2e0 a2=3 a3=0 items=0 ppid=1 pid=3370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:13.921105 kernel: audit: type=1300 audit(1747270633.902:1075): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2dcae2e0 a2=3 a3=0 items=0 ppid=1 pid=3370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:13.921147 kernel: audit: type=1327 audit(1747270633.902:1075): proctitle=737368643A20636F7265205B707269765D May 15 00:57:13.902000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:13.911000 audit[3370]: USER_START pid=3370 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.936709 kernel: audit: type=1105 audit(1747270633.911:1076): pid=3370 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.936750 kernel: audit: type=1103 audit(1747270633.912:1077): pid=3372 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:13.912000 audit[3372]: CRED_ACQ pid=3372 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:14.051617 sshd[3370]: pam_unix(sshd:session): session closed for user core May 15 00:57:14.051000 audit[3370]: USER_END pid=3370 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:14.053982 systemd[1]: sshd@13-10.0.0.118:22-10.0.0.1:38736.service: Deactivated successfully. May 15 00:57:14.054642 systemd[1]: session-14.scope: Deactivated successfully. May 15 00:57:14.051000 audit[3370]: CRED_DISP pid=3370 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:14.057879 systemd-logind[1187]: Session 14 logged out. Waiting for processes to exit. May 15 00:57:14.058739 systemd-logind[1187]: Removed session 14. May 15 00:57:14.061132 kernel: audit: type=1106 audit(1747270634.051:1078): pid=3370 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:14.061208 kernel: audit: type=1104 audit(1747270634.051:1079): pid=3370 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:14.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:38736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:15.414177 kubelet[1952]: I0515 00:57:15.414131 1952 scope.go:117] "RemoveContainer" containerID="3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a" May 15 00:57:15.414543 kubelet[1952]: E0515 00:57:15.414212 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:15.415922 env[1201]: time="2025-05-15T00:57:15.415886432Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 15 00:57:15.432890 env[1201]: time="2025-05-15T00:57:15.432841844Z" level=info msg="CreateContainer within sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a\"" May 15 00:57:15.433272 env[1201]: time="2025-05-15T00:57:15.433239811Z" level=info msg="StartContainer for \"a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a\"" May 15 00:57:15.449324 systemd[1]: Started cri-containerd-a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a.scope. May 15 00:57:15.460000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f42d9f4a688 items=0 ppid=2375 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:15.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663633326261363764616636346337356236343461346537653161 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.460000 audit: BPF prog-id=142 op=LOAD May 15 00:57:15.460000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022eba8 items=0 ppid=2375 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:15.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663633326261363764616636346337356236343461346537653161 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit: BPF prog-id=143 op=LOAD May 15 00:57:15.461000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022ebf8 items=0 ppid=2375 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:15.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663633326261363764616636346337356236343461346537653161 May 15 00:57:15.461000 audit: BPF prog-id=143 op=UNLOAD May 15 00:57:15.461000 audit: BPF prog-id=142 op=UNLOAD May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:15.461000 audit: BPF prog-id=144 op=LOAD May 15 00:57:15.461000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022ec88 items=0 ppid=2375 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:15.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663633326261363764616636346337356236343461346537653161 May 15 00:57:15.472262 env[1201]: time="2025-05-15T00:57:15.472206014Z" level=info msg="StartContainer for \"a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a\" returns successfully" May 15 00:57:15.515094 systemd[1]: cri-containerd-a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a.scope: Deactivated successfully. May 15 00:57:15.520000 audit: BPF prog-id=144 op=UNLOAD May 15 00:57:15.528949 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a-rootfs.mount: Deactivated successfully. May 15 00:57:15.539095 env[1201]: time="2025-05-15T00:57:15.539044630Z" level=info msg="shim disconnected" id=a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a May 15 00:57:15.539095 env[1201]: time="2025-05-15T00:57:15.539088615Z" level=warning msg="cleaning up after shim disconnected" id=a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a namespace=k8s.io May 15 00:57:15.539252 env[1201]: time="2025-05-15T00:57:15.539097191Z" level=info msg="cleaning up dead shim" May 15 00:57:15.544516 env[1201]: time="2025-05-15T00:57:15.544481303Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3434 runtime=io.containerd.runc.v2\n" May 15 00:57:15.742555 kubelet[1952]: I0515 00:57:15.742438 1952 scope.go:117] "RemoveContainer" containerID="3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a" May 15 00:57:15.742758 kubelet[1952]: I0515 00:57:15.742733 1952 scope.go:117] "RemoveContainer" containerID="a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a" May 15 00:57:15.742835 kubelet[1952]: E0515 00:57:15.742805 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:15.742914 kubelet[1952]: E0515 00:57:15.742889 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-79g4s_calico-system(82c69aa6-374c-4143-a0d9-2c418c663f3b)\"" pod="calico-system/calico-node-79g4s" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" May 15 00:57:15.744669 env[1201]: time="2025-05-15T00:57:15.744632839Z" level=info msg="RemoveContainer for \"3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a\"" May 15 00:57:15.748740 env[1201]: time="2025-05-15T00:57:15.748704072Z" level=info msg="RemoveContainer for \"3dfd8c9e26e723367d143932a5e2f857fd7395dd0c7c4d11976f89dfe2fe516a\" returns successfully" May 15 00:57:19.055566 systemd[1]: Started sshd@14-10.0.0.118:22-10.0.0.1:51272.service. May 15 00:57:19.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:51272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:19.056868 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 00:57:19.056987 kernel: audit: type=1130 audit(1747270639.054:1088): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:51272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:19.098000 audit[3447]: USER_ACCT pid=3447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.099219 sshd[3447]: Accepted publickey for core from 10.0.0.1 port 51272 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:19.101332 sshd[3447]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:19.100000 audit[3447]: CRED_ACQ pid=3447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.105131 systemd-logind[1187]: New session 15 of user core. May 15 00:57:19.106171 systemd[1]: Started session-15.scope. May 15 00:57:19.108209 kernel: audit: type=1101 audit(1747270639.098:1089): pid=3447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.108255 kernel: audit: type=1103 audit(1747270639.100:1090): pid=3447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.108281 kernel: audit: type=1006 audit(1747270639.100:1091): pid=3447 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 00:57:19.111013 kernel: audit: type=1300 audit(1747270639.100:1091): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5843f080 a2=3 a3=0 items=0 ppid=1 pid=3447 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:19.100000 audit[3447]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5843f080 a2=3 a3=0 items=0 ppid=1 pid=3447 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:19.100000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:19.116441 kernel: audit: type=1327 audit(1747270639.100:1091): proctitle=737368643A20636F7265205B707269765D May 15 00:57:19.116489 kernel: audit: type=1105 audit(1747270639.109:1092): pid=3447 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.109000 audit[3447]: USER_START pid=3447 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.110000 audit[3449]: CRED_ACQ pid=3449 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.124068 kernel: audit: type=1103 audit(1747270639.110:1093): pid=3449 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.207667 sshd[3447]: pam_unix(sshd:session): session closed for user core May 15 00:57:19.207000 audit[3447]: USER_END pid=3447 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.210078 systemd[1]: sshd@14-10.0.0.118:22-10.0.0.1:51272.service: Deactivated successfully. May 15 00:57:19.210733 systemd[1]: session-15.scope: Deactivated successfully. May 15 00:57:19.211291 systemd-logind[1187]: Session 15 logged out. Waiting for processes to exit. May 15 00:57:19.212000 systemd-logind[1187]: Removed session 15. May 15 00:57:19.207000 audit[3447]: CRED_DISP pid=3447 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.216386 kernel: audit: type=1106 audit(1747270639.207:1094): pid=3447 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.216440 kernel: audit: type=1104 audit(1747270639.207:1095): pid=3447 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:19.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:51272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:19.418520 env[1201]: time="2025-05-15T00:57:19.417467367Z" level=info msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\"" May 15 00:57:19.418911 env[1201]: time="2025-05-15T00:57:19.418658198Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" May 15 00:57:19.441246 env[1201]: time="2025-05-15T00:57:19.441187425Z" level=error msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\" failed" error="failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:19.441464 kubelet[1952]: E0515 00:57:19.441415 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:19.441699 kubelet[1952]: E0515 00:57:19.441474 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b"} May 15 00:57:19.441699 kubelet[1952]: E0515 00:57:19.441507 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:19.441699 kubelet[1952]: E0515 00:57:19.441527 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vql69" podUID="1938aa66-e571-4496-bebb-744c342d6aef" May 15 00:57:19.442944 env[1201]: time="2025-05-15T00:57:19.442898696Z" level=error msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" failed" error="failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:19.443107 kubelet[1952]: E0515 00:57:19.443067 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:19.443173 kubelet[1952]: E0515 00:57:19.443124 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322"} May 15 00:57:19.443173 kubelet[1952]: E0515 00:57:19.443161 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:19.443244 kubelet[1952]: E0515 00:57:19.443184 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podUID="0a5535c4-986f-4643-a53c-ec6f9f2e8c64" May 15 00:57:21.415269 env[1201]: time="2025-05-15T00:57:21.415228103Z" level=info msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\"" May 15 00:57:21.415877 env[1201]: time="2025-05-15T00:57:21.415228093Z" level=info msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\"" May 15 00:57:21.440379 env[1201]: time="2025-05-15T00:57:21.440315302Z" level=error msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\" failed" error="failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:21.440651 kubelet[1952]: E0515 00:57:21.440569 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:21.440935 kubelet[1952]: E0515 00:57:21.440652 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6"} May 15 00:57:21.440935 kubelet[1952]: E0515 00:57:21.440695 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:21.440935 kubelet[1952]: E0515 00:57:21.440728 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" podUID="de5f883d-944b-478c-823a-9f80a77fd7ec" May 15 00:57:21.441117 env[1201]: time="2025-05-15T00:57:21.440832946Z" level=error msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\" failed" error="failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:21.441151 kubelet[1952]: E0515 00:57:21.440937 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:21.441151 kubelet[1952]: E0515 00:57:21.440976 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e"} May 15 00:57:21.441151 kubelet[1952]: E0515 00:57:21.441000 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:21.441151 kubelet[1952]: E0515 00:57:21.441022 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:57:22.415280 env[1201]: time="2025-05-15T00:57:22.415233107Z" level=info msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\"" May 15 00:57:22.442914 env[1201]: time="2025-05-15T00:57:22.442830991Z" level=error msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\" failed" error="failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:22.443156 kubelet[1952]: E0515 00:57:22.443102 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:22.443413 kubelet[1952]: E0515 00:57:22.443169 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b"} May 15 00:57:22.443413 kubelet[1952]: E0515 00:57:22.443202 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:22.443413 kubelet[1952]: E0515 00:57:22.443224 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-2sdq7" podUID="628d39ea-73a2-4f12-a393-62eacd958aa6" May 15 00:57:24.212117 systemd[1]: Started sshd@15-10.0.0.118:22-10.0.0.1:51278.service. May 15 00:57:24.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:51278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:24.213319 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:57:24.213365 kernel: audit: type=1130 audit(1747270644.210:1097): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:51278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:24.250000 audit[3577]: USER_ACCT pid=3577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.252578 sshd[3577]: Accepted publickey for core from 10.0.0.1 port 51278 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:24.254129 sshd[3577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:24.252000 audit[3577]: CRED_ACQ pid=3577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.257757 systemd-logind[1187]: New session 16 of user core. May 15 00:57:24.258828 systemd[1]: Started session-16.scope. May 15 00:57:24.262620 kernel: audit: type=1101 audit(1747270644.250:1098): pid=3577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.262745 kernel: audit: type=1103 audit(1747270644.252:1099): pid=3577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.262777 kernel: audit: type=1006 audit(1747270644.252:1100): pid=3577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 00:57:24.252000 audit[3577]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdea348600 a2=3 a3=0 items=0 ppid=1 pid=3577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:24.271360 kernel: audit: type=1300 audit(1747270644.252:1100): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdea348600 a2=3 a3=0 items=0 ppid=1 pid=3577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:24.271430 kernel: audit: type=1327 audit(1747270644.252:1100): proctitle=737368643A20636F7265205B707269765D May 15 00:57:24.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:24.261000 audit[3577]: USER_START pid=3577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.278959 kernel: audit: type=1105 audit(1747270644.261:1101): pid=3577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.279018 kernel: audit: type=1103 audit(1747270644.262:1102): pid=3579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.262000 audit[3579]: CRED_ACQ pid=3579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.366555 sshd[3577]: pam_unix(sshd:session): session closed for user core May 15 00:57:24.365000 audit[3577]: USER_END pid=3577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.369029 systemd[1]: sshd@15-10.0.0.118:22-10.0.0.1:51278.service: Deactivated successfully. May 15 00:57:24.369670 systemd[1]: session-16.scope: Deactivated successfully. May 15 00:57:24.370192 systemd-logind[1187]: Session 16 logged out. Waiting for processes to exit. May 15 00:57:24.371005 systemd-logind[1187]: Removed session 16. May 15 00:57:24.365000 audit[3577]: CRED_DISP pid=3577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.375326 kernel: audit: type=1106 audit(1747270644.365:1103): pid=3577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.375402 kernel: audit: type=1104 audit(1747270644.365:1104): pid=3577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:24.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:51278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:24.414732 env[1201]: time="2025-05-15T00:57:24.414655895Z" level=info msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\"" May 15 00:57:24.437929 env[1201]: time="2025-05-15T00:57:24.437866074Z" level=error msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\" failed" error="failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:24.438141 kubelet[1952]: E0515 00:57:24.438090 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:24.438374 kubelet[1952]: E0515 00:57:24.438147 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe"} May 15 00:57:24.438374 kubelet[1952]: E0515 00:57:24.438184 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:24.438374 kubelet[1952]: E0515 00:57:24.438208 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" podUID="845cb051-99b7-48ea-80e1-d20868b4ea6a" May 15 00:57:24.883000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:24.883000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003960780 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:57:24.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:57:24.900000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:24.900000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a770ab0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:57:24.900000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:57:24.907000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:24.907000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00777de00 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:57:24.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:57:24.907000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:24.907000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c005953260 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:57:24.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:57:24.917000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:24.917000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0073179e0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:57:24.917000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:57:24.917000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:24.917000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c007323160 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:57:24.917000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:57:25.175000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:25.175000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:25.175000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002af8140 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:57:25.175000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015e13e0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:57:25.175000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:57:25.175000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:57:28.194635 kubelet[1952]: I0515 00:57:28.194554 1952 scope.go:117] "RemoveContainer" containerID="a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a" May 15 00:57:28.195074 kubelet[1952]: E0515 00:57:28.195058 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:28.195262 kubelet[1952]: E0515 00:57:28.195240 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-79g4s_calico-system(82c69aa6-374c-4143-a0d9-2c418c663f3b)\"" pod="calico-system/calico-node-79g4s" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" May 15 00:57:29.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:29.371426 systemd[1]: Started sshd@16-10.0.0.118:22-10.0.0.1:37622.service. May 15 00:57:29.372557 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 00:57:29.372598 kernel: audit: type=1130 audit(1747270649.370:1114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:29.412000 audit[3615]: USER_ACCT pid=3615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.413547 sshd[3615]: Accepted publickey for core from 10.0.0.1 port 37622 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:29.416085 sshd[3615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:29.421099 kernel: audit: type=1101 audit(1747270649.412:1115): pid=3615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.421168 kernel: audit: type=1103 audit(1747270649.414:1116): pid=3615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.414000 audit[3615]: CRED_ACQ pid=3615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.420062 systemd-logind[1187]: New session 17 of user core. May 15 00:57:29.420745 systemd[1]: Started session-17.scope. May 15 00:57:29.423905 kernel: audit: type=1006 audit(1747270649.414:1117): pid=3615 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 00:57:29.423976 kernel: audit: type=1300 audit(1747270649.414:1117): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e0d6ee0 a2=3 a3=0 items=0 ppid=1 pid=3615 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:29.414000 audit[3615]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e0d6ee0 a2=3 a3=0 items=0 ppid=1 pid=3615 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:29.427963 kernel: audit: type=1327 audit(1747270649.414:1117): proctitle=737368643A20636F7265205B707269765D May 15 00:57:29.414000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:29.429530 kernel: audit: type=1105 audit(1747270649.424:1118): pid=3615 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.424000 audit[3615]: USER_START pid=3615 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.434221 kernel: audit: type=1103 audit(1747270649.425:1119): pid=3617 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.425000 audit[3617]: CRED_ACQ pid=3617 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.518973 sshd[3615]: pam_unix(sshd:session): session closed for user core May 15 00:57:29.519000 audit[3615]: USER_END pid=3615 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.521602 systemd[1]: sshd@16-10.0.0.118:22-10.0.0.1:37622.service: Deactivated successfully. May 15 00:57:29.522252 systemd[1]: session-17.scope: Deactivated successfully. May 15 00:57:29.519000 audit[3615]: CRED_DISP pid=3615 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.525319 systemd-logind[1187]: Session 17 logged out. Waiting for processes to exit. May 15 00:57:29.525990 systemd-logind[1187]: Removed session 17. May 15 00:57:29.527626 kernel: audit: type=1106 audit(1747270649.519:1120): pid=3615 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.527669 kernel: audit: type=1104 audit(1747270649.519:1121): pid=3615 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:29.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:29.729981 kubelet[1952]: I0515 00:57:29.729853 1952 scope.go:117] "RemoveContainer" containerID="a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a" May 15 00:57:29.729981 kubelet[1952]: E0515 00:57:29.729928 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:29.730355 kubelet[1952]: E0515 00:57:29.730011 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-79g4s_calico-system(82c69aa6-374c-4143-a0d9-2c418c663f3b)\"" pod="calico-system/calico-node-79g4s" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" May 15 00:57:30.414595 env[1201]: time="2025-05-15T00:57:30.414509559Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" May 15 00:57:30.437251 env[1201]: time="2025-05-15T00:57:30.437177622Z" level=error msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" failed" error="failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:30.437461 kubelet[1952]: E0515 00:57:30.437411 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:30.437512 kubelet[1952]: E0515 00:57:30.437470 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322"} May 15 00:57:30.437512 kubelet[1952]: E0515 00:57:30.437507 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:30.437598 kubelet[1952]: E0515 00:57:30.437529 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podUID="0a5535c4-986f-4643-a53c-ec6f9f2e8c64" May 15 00:57:32.756000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:32.756000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016a11e0 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:57:32.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:57:32.757000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:32.757000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:32.757000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016a1200 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:57:32.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:57:32.757000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002af8e80 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:57:32.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:57:32.757000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:57:32.757000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016a1220 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:57:32.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:57:34.415167 env[1201]: time="2025-05-15T00:57:34.415120829Z" level=info msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\"" May 15 00:57:34.415167 env[1201]: time="2025-05-15T00:57:34.415156968Z" level=info msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\"" May 15 00:57:34.438808 env[1201]: time="2025-05-15T00:57:34.438737526Z" level=error msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\" failed" error="failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:34.438990 kubelet[1952]: E0515 00:57:34.438958 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:34.439245 kubelet[1952]: E0515 00:57:34.439009 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b"} May 15 00:57:34.439245 kubelet[1952]: E0515 00:57:34.439045 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:34.439245 kubelet[1952]: E0515 00:57:34.439067 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1938aa66-e571-4496-bebb-744c342d6aef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vql69" podUID="1938aa66-e571-4496-bebb-744c342d6aef" May 15 00:57:34.442242 env[1201]: time="2025-05-15T00:57:34.442202325Z" level=error msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\" failed" error="failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:34.442391 kubelet[1952]: E0515 00:57:34.442359 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:34.442451 kubelet[1952]: E0515 00:57:34.442394 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e"} May 15 00:57:34.442451 kubelet[1952]: E0515 00:57:34.442417 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:34.442451 kubelet[1952]: E0515 00:57:34.442434 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c5fc9436-49d5-4858-9e14-f9808a9046d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8b5hz" podUID="c5fc9436-49d5-4858-9e14-f9808a9046d4" May 15 00:57:34.523263 systemd[1]: Started sshd@17-10.0.0.118:22-10.0.0.1:37632.service. May 15 00:57:34.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:37632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:34.524353 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 00:57:34.524407 kernel: audit: type=1130 audit(1747270654.522:1127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:37632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:34.562000 audit[3703]: USER_ACCT pid=3703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.563310 sshd[3703]: Accepted publickey for core from 10.0.0.1 port 37632 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:34.565408 sshd[3703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:34.564000 audit[3703]: CRED_ACQ pid=3703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.569090 systemd-logind[1187]: New session 18 of user core. May 15 00:57:34.570056 systemd[1]: Started session-18.scope. May 15 00:57:34.571482 kernel: audit: type=1101 audit(1747270654.562:1128): pid=3703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.571534 kernel: audit: type=1103 audit(1747270654.564:1129): pid=3703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.571553 kernel: audit: type=1006 audit(1747270654.564:1130): pid=3703 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 00:57:34.564000 audit[3703]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5371db0 a2=3 a3=0 items=0 ppid=1 pid=3703 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:34.577942 kernel: audit: type=1300 audit(1747270654.564:1130): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5371db0 a2=3 a3=0 items=0 ppid=1 pid=3703 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:34.578003 kernel: audit: type=1327 audit(1747270654.564:1130): proctitle=737368643A20636F7265205B707269765D May 15 00:57:34.564000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:34.573000 audit[3703]: USER_START pid=3703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.583324 kernel: audit: type=1105 audit(1747270654.573:1131): pid=3703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.583377 kernel: audit: type=1103 audit(1747270654.574:1132): pid=3705 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.574000 audit[3705]: CRED_ACQ pid=3705 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.677848 sshd[3703]: pam_unix(sshd:session): session closed for user core May 15 00:57:34.678000 audit[3703]: USER_END pid=3703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.679864 systemd[1]: sshd@17-10.0.0.118:22-10.0.0.1:37632.service: Deactivated successfully. May 15 00:57:34.680640 systemd[1]: session-18.scope: Deactivated successfully. May 15 00:57:34.681494 systemd-logind[1187]: Session 18 logged out. Waiting for processes to exit. May 15 00:57:34.682133 systemd-logind[1187]: Removed session 18. May 15 00:57:34.678000 audit[3703]: CRED_DISP pid=3703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.686970 kernel: audit: type=1106 audit(1747270654.678:1133): pid=3703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.687016 kernel: audit: type=1104 audit(1747270654.678:1134): pid=3703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:34.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:37632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:35.414837 env[1201]: time="2025-05-15T00:57:35.414785295Z" level=info msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\"" May 15 00:57:35.440428 env[1201]: time="2025-05-15T00:57:35.440344758Z" level=error msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\" failed" error="failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:35.440816 kubelet[1952]: E0515 00:57:35.440610 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:35.440816 kubelet[1952]: E0515 00:57:35.440671 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6"} May 15 00:57:35.440816 kubelet[1952]: E0515 00:57:35.440710 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:35.440816 kubelet[1952]: E0515 00:57:35.440751 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de5f883d-944b-478c-823a-9f80a77fd7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" podUID="de5f883d-944b-478c-823a-9f80a77fd7ec" May 15 00:57:36.414982 env[1201]: time="2025-05-15T00:57:36.414918958Z" level=info msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\"" May 15 00:57:36.435962 env[1201]: time="2025-05-15T00:57:36.435903494Z" level=error msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\" failed" error="failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:36.436183 kubelet[1952]: E0515 00:57:36.436139 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:36.436229 kubelet[1952]: E0515 00:57:36.436195 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b"} May 15 00:57:36.436253 kubelet[1952]: E0515 00:57:36.436227 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:36.436317 kubelet[1952]: E0515 00:57:36.436249 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"628d39ea-73a2-4f12-a393-62eacd958aa6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-2sdq7" podUID="628d39ea-73a2-4f12-a393-62eacd958aa6" May 15 00:57:37.414896 env[1201]: time="2025-05-15T00:57:37.414814779Z" level=info msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\"" May 15 00:57:37.436062 env[1201]: time="2025-05-15T00:57:37.436006075Z" level=error msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\" failed" error="failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:37.436322 kubelet[1952]: E0515 00:57:37.436265 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:37.436546 kubelet[1952]: E0515 00:57:37.436331 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe"} May 15 00:57:37.436546 kubelet[1952]: E0515 00:57:37.436374 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:37.436546 kubelet[1952]: E0515 00:57:37.436417 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"845cb051-99b7-48ea-80e1-d20868b4ea6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" podUID="845cb051-99b7-48ea-80e1-d20868b4ea6a" May 15 00:57:39.681718 systemd[1]: Started sshd@18-10.0.0.118:22-10.0.0.1:56656.service. May 15 00:57:39.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:56656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:39.683074 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:57:39.683153 kernel: audit: type=1130 audit(1747270659.681:1136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:56656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:39.726000 audit[3788]: USER_ACCT pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.727257 sshd[3788]: Accepted publickey for core from 10.0.0.1 port 56656 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:39.730000 audit[3788]: CRED_ACQ pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.731846 sshd[3788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:39.735717 systemd-logind[1187]: New session 19 of user core. May 15 00:57:39.736176 kernel: audit: type=1101 audit(1747270659.726:1137): pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.736211 kernel: audit: type=1103 audit(1747270659.730:1138): pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.736231 kernel: audit: type=1006 audit(1747270659.730:1139): pid=3788 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 15 00:57:39.736680 systemd[1]: Started session-19.scope. May 15 00:57:39.730000 audit[3788]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea4918e40 a2=3 a3=0 items=0 ppid=1 pid=3788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:39.772299 kernel: audit: type=1300 audit(1747270659.730:1139): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea4918e40 a2=3 a3=0 items=0 ppid=1 pid=3788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:39.772358 kernel: audit: type=1327 audit(1747270659.730:1139): proctitle=737368643A20636F7265205B707269765D May 15 00:57:39.730000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:39.773793 kernel: audit: type=1105 audit(1747270659.739:1140): pid=3788 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.739000 audit[3788]: USER_START pid=3788 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.778376 kernel: audit: type=1103 audit(1747270659.740:1141): pid=3790 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.740000 audit[3790]: CRED_ACQ pid=3790 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.864571 sshd[3788]: pam_unix(sshd:session): session closed for user core May 15 00:57:39.864000 audit[3788]: USER_END pid=3788 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.866649 systemd[1]: sshd@18-10.0.0.118:22-10.0.0.1:56656.service: Deactivated successfully. May 15 00:57:39.867463 systemd[1]: session-19.scope: Deactivated successfully. May 15 00:57:39.868333 systemd-logind[1187]: Session 19 logged out. Waiting for processes to exit. May 15 00:57:39.868972 systemd-logind[1187]: Removed session 19. May 15 00:57:39.864000 audit[3788]: CRED_DISP pid=3788 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.874053 kernel: audit: type=1106 audit(1747270659.864:1142): pid=3788 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.874109 kernel: audit: type=1104 audit(1747270659.864:1143): pid=3788 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:39.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:56656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:40.777914 env[1201]: time="2025-05-15T00:57:40.777850664Z" level=info msg="StopPodSandbox for \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\"" May 15 00:57:40.778382 env[1201]: time="2025-05-15T00:57:40.777937187Z" level=info msg="Container to stop \"a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:57:40.778382 env[1201]: time="2025-05-15T00:57:40.777954539Z" level=info msg="Container to stop \"ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:57:40.778382 env[1201]: time="2025-05-15T00:57:40.777967584Z" level=info msg="Container to stop \"aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 00:57:40.781085 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49-shm.mount: Deactivated successfully. May 15 00:57:40.802818 systemd[1]: cri-containerd-55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49.scope: Deactivated successfully. May 15 00:57:40.802000 audit: BPF prog-id=122 op=UNLOAD May 15 00:57:40.808000 audit: BPF prog-id=125 op=UNLOAD May 15 00:57:40.824077 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49-rootfs.mount: Deactivated successfully. May 15 00:57:40.835857 env[1201]: time="2025-05-15T00:57:40.835178139Z" level=info msg="shim disconnected" id=55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49 May 15 00:57:40.835857 env[1201]: time="2025-05-15T00:57:40.835229074Z" level=warning msg="cleaning up after shim disconnected" id=55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49 namespace=k8s.io May 15 00:57:40.835857 env[1201]: time="2025-05-15T00:57:40.835240175Z" level=info msg="cleaning up dead shim" May 15 00:57:40.841633 env[1201]: time="2025-05-15T00:57:40.841601441Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3820 runtime=io.containerd.runc.v2\n" May 15 00:57:40.842085 env[1201]: time="2025-05-15T00:57:40.842055270Z" level=info msg="TearDown network for sandbox \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" successfully" May 15 00:57:40.842180 env[1201]: time="2025-05-15T00:57:40.842155869Z" level=info msg="StopPodSandbox for \"55c0ddc0198bf522e8250c567d63373b09a08e93ffc3990d76ab3e94e145be49\" returns successfully" May 15 00:57:40.879085 kubelet[1952]: I0515 00:57:40.879041 1952 memory_manager.go:355] "RemoveStaleState removing state" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" containerName="calico-node" May 15 00:57:40.879085 kubelet[1952]: I0515 00:57:40.879067 1952 memory_manager.go:355] "RemoveStaleState removing state" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" containerName="calico-node" May 15 00:57:40.879085 kubelet[1952]: I0515 00:57:40.879097 1952 memory_manager.go:355] "RemoveStaleState removing state" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" containerName="calico-node" May 15 00:57:40.883716 systemd[1]: Created slice kubepods-besteffort-pod53dd2ef0_f903_459d_be58_202500abf4e9.slice. May 15 00:57:40.932271 kubelet[1952]: I0515 00:57:40.932227 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-xtables-lock\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932271 kubelet[1952]: I0515 00:57:40.932261 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-net-dir\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932271 kubelet[1952]: I0515 00:57:40.932281 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/82c69aa6-374c-4143-a0d9-2c418c663f3b-tigera-ca-bundle\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932561 kubelet[1952]: I0515 00:57:40.932293 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-policysync\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932561 kubelet[1952]: I0515 00:57:40.932312 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-lkqww\" (UniqueName: \"kubernetes.io/projected/82c69aa6-374c-4143-a0d9-2c418c663f3b-kube-api-access-lkqww\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932561 kubelet[1952]: I0515 00:57:40.932327 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/82c69aa6-374c-4143-a0d9-2c418c663f3b-node-certs\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932561 kubelet[1952]: I0515 00:57:40.932340 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-flexvol-driver-host\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932561 kubelet[1952]: I0515 00:57:40.932354 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-bin-dir\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932561 kubelet[1952]: I0515 00:57:40.932368 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-run-calico\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932849 kubelet[1952]: I0515 00:57:40.932380 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-lib-modules\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932849 kubelet[1952]: I0515 00:57:40.932369 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.932849 kubelet[1952]: I0515 00:57:40.932393 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-lib-calico\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.932849 kubelet[1952]: I0515 00:57:40.932440 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.932849 kubelet[1952]: I0515 00:57:40.932460 1952 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-log-dir\") pod \"82c69aa6-374c-4143-a0d9-2c418c663f3b\" (UID: \"82c69aa6-374c-4143-a0d9-2c418c663f3b\") " May 15 00:57:40.933055 kubelet[1952]: I0515 00:57:40.932539 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-xtables-lock\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933055 kubelet[1952]: I0515 00:57:40.932576 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dtb64\" (UniqueName: \"kubernetes.io/projected/53dd2ef0-f903-459d-be58-202500abf4e9-kube-api-access-dtb64\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933055 kubelet[1952]: I0515 00:57:40.932602 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-policysync\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933055 kubelet[1952]: I0515 00:57:40.932616 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-cni-bin-dir\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933055 kubelet[1952]: I0515 00:57:40.932637 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53dd2ef0-f903-459d-be58-202500abf4e9-tigera-ca-bundle\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933248 kubelet[1952]: I0515 00:57:40.932652 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-var-lib-calico\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933248 kubelet[1952]: I0515 00:57:40.932666 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-cni-net-dir\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933248 kubelet[1952]: I0515 00:57:40.932679 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-flexvol-driver-host\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933248 kubelet[1952]: I0515 00:57:40.932696 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/53dd2ef0-f903-459d-be58-202500abf4e9-node-certs\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933248 kubelet[1952]: I0515 00:57:40.932708 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-cni-log-dir\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933446 kubelet[1952]: I0515 00:57:40.932722 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-var-run-calico\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933446 kubelet[1952]: I0515 00:57:40.932738 1952 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/53dd2ef0-f903-459d-be58-202500abf4e9-lib-modules\") pod \"calico-node-znppq\" (UID: \"53dd2ef0-f903-459d-be58-202500abf4e9\") " pod="calico-system/calico-node-znppq" May 15 00:57:40.933446 kubelet[1952]: I0515 00:57:40.932786 1952 reconciler_common.go:299] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-lib-calico\") on node \"localhost\" DevicePath \"\"" May 15 00:57:40.933446 kubelet[1952]: I0515 00:57:40.932804 1952 reconciler_common.go:299] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-net-dir\") on node \"localhost\" DevicePath \"\"" May 15 00:57:40.933446 kubelet[1952]: I0515 00:57:40.932834 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.933446 kubelet[1952]: I0515 00:57:40.932895 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.933687 kubelet[1952]: I0515 00:57:40.932910 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-policysync" (OuterVolumeSpecName: "policysync") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.933687 kubelet[1952]: I0515 00:57:40.933323 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.933687 kubelet[1952]: I0515 00:57:40.933344 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.933687 kubelet[1952]: I0515 00:57:40.933358 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.933687 kubelet[1952]: I0515 00:57:40.933370 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 00:57:40.938935 kubelet[1952]: I0515 00:57:40.938907 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/82c69aa6-374c-4143-a0d9-2c418c663f3b-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 15 00:57:40.940311 kubelet[1952]: I0515 00:57:40.940262 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/82c69aa6-374c-4143-a0d9-2c418c663f3b-kube-api-access-lkqww" (OuterVolumeSpecName: "kube-api-access-lkqww") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "kube-api-access-lkqww". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 15 00:57:40.940511 kubelet[1952]: I0515 00:57:40.940472 1952 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/82c69aa6-374c-4143-a0d9-2c418c663f3b-node-certs" (OuterVolumeSpecName: "node-certs") pod "82c69aa6-374c-4143-a0d9-2c418c663f3b" (UID: "82c69aa6-374c-4143-a0d9-2c418c663f3b"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 15 00:57:40.940650 systemd[1]: var-lib-kubelet-pods-82c69aa6\x2d374c\x2d4143\x2da0d9\x2d2c418c663f3b-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 00:57:40.940745 systemd[1]: var-lib-kubelet-pods-82c69aa6\x2d374c\x2d4143\x2da0d9\x2d2c418c663f3b-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dlkqww.mount: Deactivated successfully. May 15 00:57:40.942874 systemd[1]: var-lib-kubelet-pods-82c69aa6\x2d374c\x2d4143\x2da0d9\x2d2c418c663f3b-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 00:57:41.034203 kubelet[1952]: I0515 00:57:41.034084 1952 reconciler_common.go:299] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/82c69aa6-374c-4143-a0d9-2c418c663f3b-node-certs\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.034386 kubelet[1952]: I0515 00:57:41.034371 1952 reconciler_common.go:299] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.034477 kubelet[1952]: I0515 00:57:41.034462 1952 reconciler_common.go:299] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-var-run-calico\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.034560 kubelet[1952]: I0515 00:57:41.034545 1952 reconciler_common.go:299] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-cni-log-dir\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.034637 kubelet[1952]: I0515 00:57:41.034622 1952 reconciler_common.go:299] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-xtables-lock\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.034736 kubelet[1952]: I0515 00:57:41.034720 1952 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/82c69aa6-374c-4143-a0d9-2c418c663f3b-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.034855 kubelet[1952]: I0515 00:57:41.034840 1952 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-lkqww\" (UniqueName: \"kubernetes.io/projected/82c69aa6-374c-4143-a0d9-2c418c663f3b-kube-api-access-lkqww\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.035023 kubelet[1952]: I0515 00:57:41.034959 1952 reconciler_common.go:299] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.035023 kubelet[1952]: I0515 00:57:41.034991 1952 reconciler_common.go:299] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-lib-modules\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.035023 kubelet[1952]: I0515 00:57:41.034999 1952 reconciler_common.go:299] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/82c69aa6-374c-4143-a0d9-2c418c663f3b-policysync\") on node \"localhost\" DevicePath \"\"" May 15 00:57:41.186658 kubelet[1952]: E0515 00:57:41.186624 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:41.187143 env[1201]: time="2025-05-15T00:57:41.187108712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-znppq,Uid:53dd2ef0-f903-459d-be58-202500abf4e9,Namespace:calico-system,Attempt:0,}" May 15 00:57:41.341685 env[1201]: time="2025-05-15T00:57:41.341607481Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:41.341685 env[1201]: time="2025-05-15T00:57:41.341653156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:41.341972 env[1201]: time="2025-05-15T00:57:41.341928923Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:41.342230 env[1201]: time="2025-05-15T00:57:41.342193299Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0 pid=3846 runtime=io.containerd.runc.v2 May 15 00:57:41.353415 systemd[1]: Started cri-containerd-a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0.scope. May 15 00:57:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit: BPF prog-id=145 op=LOAD May 15 00:57:41.363000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3846 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613730656235396134396133363238366436663930636466363862 May 15 00:57:41.363000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.363000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3846 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613730656235396134396133363238366436663930636466363862 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit: BPF prog-id=146 op=LOAD May 15 00:57:41.364000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000edd80 items=0 ppid=3846 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613730656235396134396133363238366436663930636466363862 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit: BPF prog-id=147 op=LOAD May 15 00:57:41.364000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000eddc8 items=0 ppid=3846 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613730656235396134396133363238366436663930636466363862 May 15 00:57:41.364000 audit: BPF prog-id=147 op=UNLOAD May 15 00:57:41.364000 audit: BPF prog-id=146 op=UNLOAD May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.364000 audit: BPF prog-id=148 op=LOAD May 15 00:57:41.364000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c81d8 items=0 ppid=3846 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613730656235396134396133363238366436663930636466363862 May 15 00:57:41.375185 env[1201]: time="2025-05-15T00:57:41.375153262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-znppq,Uid:53dd2ef0-f903-459d-be58-202500abf4e9,Namespace:calico-system,Attempt:0,} returns sandbox id \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\"" May 15 00:57:41.376269 kubelet[1952]: E0515 00:57:41.375883 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:41.378140 env[1201]: time="2025-05-15T00:57:41.377532540Z" level=info msg="CreateContainer within sandbox \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:57:41.419706 systemd[1]: Removed slice kubepods-besteffort-pod82c69aa6_374c_4143_a0d9_2c418c663f3b.slice. May 15 00:57:41.466866 env[1201]: time="2025-05-15T00:57:41.466814671Z" level=info msg="CreateContainer within sandbox \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b\"" May 15 00:57:41.467349 env[1201]: time="2025-05-15T00:57:41.467317374Z" level=info msg="StartContainer for \"9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b\"" May 15 00:57:41.481380 systemd[1]: Started cri-containerd-9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b.scope. May 15 00:57:41.492000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f290dae7838 items=0 ppid=3846 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323932326139363231313235383835616133373333356135363436 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.492000 audit: BPF prog-id=149 op=LOAD May 15 00:57:41.492000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022bec8 items=0 ppid=3846 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323932326139363231313235383835616133373333356135363436 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.493000 audit: BPF prog-id=150 op=LOAD May 15 00:57:41.493000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022bf18 items=0 ppid=3846 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323932326139363231313235383835616133373333356135363436 May 15 00:57:41.494000 audit: BPF prog-id=150 op=UNLOAD May 15 00:57:41.494000 audit: BPF prog-id=149 op=UNLOAD May 15 00:57:41.494000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.494000 audit: BPF prog-id=151 op=LOAD May 15 00:57:41.494000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022bfa8 items=0 ppid=3846 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323932326139363231313235383835616133373333356135363436 May 15 00:57:41.509377 env[1201]: time="2025-05-15T00:57:41.509319454Z" level=info msg="StartContainer for \"9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b\" returns successfully" May 15 00:57:41.523576 systemd[1]: cri-containerd-9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b.scope: Deactivated successfully. May 15 00:57:41.526000 audit: BPF prog-id=151 op=UNLOAD May 15 00:57:41.578511 env[1201]: time="2025-05-15T00:57:41.578449425Z" level=info msg="shim disconnected" id=9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b May 15 00:57:41.578511 env[1201]: time="2025-05-15T00:57:41.578494841Z" level=warning msg="cleaning up after shim disconnected" id=9e2922a9621125885aa37335a56466a67d9b6270a9327f48b490df7b455b1f6b namespace=k8s.io May 15 00:57:41.578511 env[1201]: time="2025-05-15T00:57:41.578503036Z" level=info msg="cleaning up dead shim" May 15 00:57:41.584969 env[1201]: time="2025-05-15T00:57:41.584931403Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3924 runtime=io.containerd.runc.v2\n" May 15 00:57:41.791402 kubelet[1952]: I0515 00:57:41.791307 1952 scope.go:117] "RemoveContainer" containerID="a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a" May 15 00:57:41.794068 env[1201]: time="2025-05-15T00:57:41.794032357Z" level=info msg="RemoveContainer for \"a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a\"" May 15 00:57:41.795843 kubelet[1952]: E0515 00:57:41.795394 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:41.797641 env[1201]: time="2025-05-15T00:57:41.797589594Z" level=info msg="RemoveContainer for \"a6f632ba67daf64c75b644a4e7e1a2de56d5d9fdee409fc6faf4f89cd687ea9a\" returns successfully" May 15 00:57:41.797803 kubelet[1952]: I0515 00:57:41.797738 1952 scope.go:117] "RemoveContainer" containerID="ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20" May 15 00:57:41.798713 env[1201]: time="2025-05-15T00:57:41.798680749Z" level=info msg="RemoveContainer for \"ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20\"" May 15 00:57:41.800659 env[1201]: time="2025-05-15T00:57:41.800628449Z" level=info msg="CreateContainer within sandbox \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:57:41.805267 env[1201]: time="2025-05-15T00:57:41.805228981Z" level=info msg="RemoveContainer for \"ccf50fa09b66f4f4db3214ec3016cc6461daf5dfec214a9ac6032a5defc91f20\" returns successfully" May 15 00:57:41.805421 kubelet[1952]: I0515 00:57:41.805401 1952 scope.go:117] "RemoveContainer" containerID="aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360" May 15 00:57:41.806518 env[1201]: time="2025-05-15T00:57:41.806473604Z" level=info msg="RemoveContainer for \"aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360\"" May 15 00:57:41.810016 env[1201]: time="2025-05-15T00:57:41.809980437Z" level=info msg="RemoveContainer for \"aee45f4186515188071f359ddca4cf02213357db30a8ed8b22263ff47d76a360\" returns successfully" May 15 00:57:41.823599 env[1201]: time="2025-05-15T00:57:41.823540510Z" level=info msg="CreateContainer within sandbox \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124\"" May 15 00:57:41.824235 env[1201]: time="2025-05-15T00:57:41.824202361Z" level=info msg="StartContainer for \"a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124\"" May 15 00:57:41.839706 systemd[1]: Started cri-containerd-a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124.scope. May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fdf5a1a9ef8 items=0 ppid=3846 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135316633333139353165313931643661633664613463653739316237 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit: BPF prog-id=152 op=LOAD May 15 00:57:41.853000 audit[3944]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003a24b8 items=0 ppid=3846 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135316633333139353165313931643661633664613463653739316237 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.853000 audit: BPF prog-id=153 op=LOAD May 15 00:57:41.853000 audit[3944]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003a2508 items=0 ppid=3846 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135316633333139353165313931643661633664613463653739316237 May 15 00:57:41.854000 audit: BPF prog-id=153 op=UNLOAD May 15 00:57:41.854000 audit: BPF prog-id=152 op=UNLOAD May 15 00:57:41.854000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { perfmon } for pid=3944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit[3944]: AVC avc: denied { bpf } for pid=3944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:41.854000 audit: BPF prog-id=154 op=LOAD May 15 00:57:41.854000 audit[3944]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003a2598 items=0 ppid=3846 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:41.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135316633333139353165313931643661633664613463653739316237 May 15 00:57:41.869996 env[1201]: time="2025-05-15T00:57:41.869956743Z" level=info msg="StartContainer for \"a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124\" returns successfully" May 15 00:57:42.273428 systemd[1]: cri-containerd-a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124.scope: Deactivated successfully. May 15 00:57:42.277000 audit: BPF prog-id=154 op=UNLOAD May 15 00:57:42.293885 env[1201]: time="2025-05-15T00:57:42.293808467Z" level=info msg="shim disconnected" id=a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124 May 15 00:57:42.293885 env[1201]: time="2025-05-15T00:57:42.293876945Z" level=warning msg="cleaning up after shim disconnected" id=a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124 namespace=k8s.io May 15 00:57:42.293885 env[1201]: time="2025-05-15T00:57:42.293893246Z" level=info msg="cleaning up dead shim" May 15 00:57:42.300331 env[1201]: time="2025-05-15T00:57:42.300248303Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:57:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3990 runtime=io.containerd.runc.v2\n" May 15 00:57:42.414816 env[1201]: time="2025-05-15T00:57:42.414720537Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" May 15 00:57:42.439869 env[1201]: time="2025-05-15T00:57:42.439802179Z" level=error msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" failed" error="failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:57:42.440103 kubelet[1952]: E0515 00:57:42.440053 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:42.440401 kubelet[1952]: E0515 00:57:42.440123 1952 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322"} May 15 00:57:42.440401 kubelet[1952]: E0515 00:57:42.440171 1952 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:57:42.440401 kubelet[1952]: E0515 00:57:42.440200 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a5535c4-986f-4643-a53c-ec6f9f2e8c64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podUID="0a5535c4-986f-4643-a53c-ec6f9f2e8c64" May 15 00:57:42.780079 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a51f331951e191d6ac6da4ce791b7fdb4b423a363e167b2828189dc849188124-rootfs.mount: Deactivated successfully. May 15 00:57:42.799106 kubelet[1952]: E0515 00:57:42.799073 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:42.808546 env[1201]: time="2025-05-15T00:57:42.808506731Z" level=info msg="CreateContainer within sandbox \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:57:42.822349 env[1201]: time="2025-05-15T00:57:42.822300908Z" level=info msg="CreateContainer within sandbox \"a0a70eb59a49a36286d6f90cdf68b7ec0e2774b85142ffc04aa55b7fa93fe8d0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e1bd5feab200c2e1b5d984b2af5d9254947eb3a229db05be7504ba186a3f8d33\"" May 15 00:57:42.822838 env[1201]: time="2025-05-15T00:57:42.822815543Z" level=info msg="StartContainer for \"e1bd5feab200c2e1b5d984b2af5d9254947eb3a229db05be7504ba186a3f8d33\"" May 15 00:57:42.835600 systemd[1]: Started cri-containerd-e1bd5feab200c2e1b5d984b2af5d9254947eb3a229db05be7504ba186a3f8d33.scope. May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff97cb53718 items=0 ppid=3846 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531626435666561623230306332653162356439383462326166356439 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit: BPF prog-id=155 op=LOAD May 15 00:57:42.850000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000212fa8 items=0 ppid=3846 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531626435666561623230306332653162356439383462326166356439 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit: BPF prog-id=156 op=LOAD May 15 00:57:42.850000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000212ff8 items=0 ppid=3846 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531626435666561623230306332653162356439383462326166356439 May 15 00:57:42.850000 audit: BPF prog-id=156 op=UNLOAD May 15 00:57:42.850000 audit: BPF prog-id=155 op=UNLOAD May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:42.850000 audit: BPF prog-id=157 op=LOAD May 15 00:57:42.850000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000213088 items=0 ppid=3846 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:42.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531626435666561623230306332653162356439383462326166356439 May 15 00:57:42.863993 env[1201]: time="2025-05-15T00:57:42.863934217Z" level=info msg="StartContainer for \"e1bd5feab200c2e1b5d984b2af5d9254947eb3a229db05be7504ba186a3f8d33\" returns successfully" May 15 00:57:43.416648 kubelet[1952]: I0515 00:57:43.416607 1952 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="82c69aa6-374c-4143-a0d9-2c418c663f3b" path="/var/lib/kubelet/pods/82c69aa6-374c-4143-a0d9-2c418c663f3b/volumes" May 15 00:57:43.803920 kubelet[1952]: E0515 00:57:43.803805 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:43.819777 kubelet[1952]: I0515 00:57:43.819459 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-znppq" podStartSLOduration=3.819433619 podStartE2EDuration="3.819433619s" podCreationTimestamp="2025-05-15 00:57:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:57:43.818340608 +0000 UTC m=+76.474214733" watchObservedRunningTime="2025-05-15 00:57:43.819433619 +0000 UTC m=+76.475307744" May 15 00:57:44.234000 audit[4157]: AVC avc: denied { write } for pid=4157 comm="tee" name="fd" dev="proc" ino=26358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.234000 audit[4157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2147da2a a2=241 a3=1b6 items=1 ppid=4124 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.234000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 00:57:44.234000 audit: PATH item=0 name="/dev/fd/63" inode=27952 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.234000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.239000 audit[4153]: AVC avc: denied { write } for pid=4153 comm="tee" name="fd" dev="proc" ino=26368 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.239000 audit[4153]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0ecd7a2c a2=241 a3=1b6 items=1 ppid=4122 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.239000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 00:57:44.239000 audit: PATH item=0 name="/dev/fd/63" inode=25379 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.251000 audit[4190]: AVC avc: denied { write } for pid=4190 comm="tee" name="fd" dev="proc" ino=27272 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.251000 audit[4190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa95a3a1b a2=241 a3=1b6 items=1 ppid=4121 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.251000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 00:57:44.251000 audit: PATH item=0 name="/dev/fd/63" inode=27269 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.251000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.254000 audit[4169]: AVC avc: denied { write } for pid=4169 comm="tee" name="fd" dev="proc" ino=26378 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.254000 audit[4169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbb3c4a2a a2=241 a3=1b6 items=1 ppid=4126 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.254000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 00:57:44.254000 audit: PATH item=0 name="/dev/fd/63" inode=27955 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.254000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.258000 audit[4179]: AVC avc: denied { write } for pid=4179 comm="tee" name="fd" dev="proc" ino=27958 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.259000 audit[4200]: AVC avc: denied { write } for pid=4200 comm="tee" name="fd" dev="proc" ino=26387 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.259000 audit[4200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff781f8a1a a2=241 a3=1b6 items=1 ppid=4132 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.259000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 00:57:44.259000 audit: PATH item=0 name="/dev/fd/63" inode=26384 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.259000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.258000 audit[4179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7dbf3a2b a2=241 a3=1b6 items=1 ppid=4131 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.258000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 00:57:44.258000 audit: PATH item=0 name="/dev/fd/63" inode=26374 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.282000 audit[4188]: AVC avc: denied { write } for pid=4188 comm="tee" name="fd" dev="proc" ino=27971 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:57:44.282000 audit[4188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe24c85a2a a2=241 a3=1b6 items=1 ppid=4137 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.282000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 00:57:44.282000 audit: PATH item=0 name="/dev/fd/63" inode=27266 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:57:44.282000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.356000 audit: BPF prog-id=158 op=LOAD May 15 00:57:44.356000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd23f10810 a2=98 a3=3 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.356000 audit: BPF prog-id=158 op=UNLOAD May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit: BPF prog-id=159 op=LOAD May 15 00:57:44.357000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd23f105f0 a2=74 a3=540051 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.357000 audit: BPF prog-id=159 op=UNLOAD May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.357000 audit: BPF prog-id=160 op=LOAD May 15 00:57:44.357000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd23f10620 a2=94 a3=2 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.358000 audit: BPF prog-id=160 op=UNLOAD May 15 00:57:44.473000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.473000 audit: BPF prog-id=161 op=LOAD May 15 00:57:44.473000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd23f104e0 a2=40 a3=1 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.473000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.474000 audit: BPF prog-id=161 op=UNLOAD May 15 00:57:44.474000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.474000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd23f105b0 a2=50 a3=7ffd23f10690 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.474000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd23f104f0 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd23f10520 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd23f10430 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd23f10540 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd23f10520 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd23f10510 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd23f10540 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd23f10520 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd23f10540 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd23f10510 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.482000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.482000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd23f10580 a2=28 a3=0 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd23f10330 a2=50 a3=1 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit: BPF prog-id=162 op=LOAD May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd23f10330 a2=94 a3=5 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit: BPF prog-id=162 op=UNLOAD May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd23f103e0 a2=50 a3=1 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd23f10500 a2=4 a3=38 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { confidentiality } for pid=4237 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd23f10550 a2=94 a3=6 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { confidentiality } for pid=4237 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd23f0fd00 a2=94 a3=83 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.483000 audit[4237]: AVC avc: denied { confidentiality } for pid=4237 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.483000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd23f0fd00 a2=94 a3=83 items=0 ppid=4139 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit: BPF prog-id=163 op=LOAD May 15 00:57:44.491000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4e75c3f0 a2=98 a3=1999999999999999 items=0 ppid=4139 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.491000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:57:44.491000 audit: BPF prog-id=163 op=UNLOAD May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit: BPF prog-id=164 op=LOAD May 15 00:57:44.491000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4e75c2d0 a2=74 a3=ffff items=0 ppid=4139 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.491000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:57:44.491000 audit: BPF prog-id=164 op=UNLOAD May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.491000 audit: BPF prog-id=165 op=LOAD May 15 00:57:44.491000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4e75c310 a2=40 a3=7ffe4e75c4f0 items=0 ppid=4139 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.491000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:57:44.491000 audit: BPF prog-id=165 op=UNLOAD May 15 00:57:44.527978 systemd-networkd[1018]: vxlan.calico: Link UP May 15 00:57:44.527985 systemd-networkd[1018]: vxlan.calico: Gained carrier May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit: BPF prog-id=166 op=LOAD May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2ecccf40 a2=98 a3=ffffffff items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit: BPF prog-id=166 op=UNLOAD May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit: BPF prog-id=167 op=LOAD May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2ecccd50 a2=74 a3=540051 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit: BPF prog-id=167 op=UNLOAD May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit: BPF prog-id=168 op=LOAD May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2ecccd80 a2=94 a3=2 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit: BPF prog-id=168 op=UNLOAD May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ecccc50 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ecccc80 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ecccb90 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ecccca0 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ecccc80 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.538000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.538000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ecccc70 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ecccca0 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ecccc80 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ecccca0 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ecccc70 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ecccce0 a2=28 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit: BPF prog-id=169 op=LOAD May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2ecccb50 a2=40 a3=0 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit: BPF prog-id=169 op=UNLOAD May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe2ecccb40 a2=50 a3=2800 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe2ecccb40 a2=50 a3=2800 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit: BPF prog-id=170 op=LOAD May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2eccc360 a2=94 a3=2 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.540000 audit: BPF prog-id=170 op=UNLOAD May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.540000 audit: BPF prog-id=171 op=LOAD May 15 00:57:44.540000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2eccc460 a2=94 a3=30 items=0 ppid=4139 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit: BPF prog-id=172 op=LOAD May 15 00:57:44.543000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb790b040 a2=98 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.543000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.543000 audit: BPF prog-id=172 op=UNLOAD May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit: BPF prog-id=173 op=LOAD May 15 00:57:44.543000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb790ae20 a2=74 a3=540051 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.543000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.543000 audit: BPF prog-id=173 op=UNLOAD May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.543000 audit: BPF prog-id=174 op=LOAD May 15 00:57:44.543000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb790ae50 a2=94 a3=2 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.543000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.543000 audit: BPF prog-id=174 op=UNLOAD May 15 00:57:44.661000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit: BPF prog-id=175 op=LOAD May 15 00:57:44.661000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb790ad10 a2=40 a3=1 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.661000 audit: BPF prog-id=175 op=UNLOAD May 15 00:57:44.661000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.661000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb790ade0 a2=50 a3=7fffb790aec0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb790ad20 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb790ad50 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb790ac60 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb790ad70 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb790ad50 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb790ad40 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb790ad70 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb790ad50 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb790ad70 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb790ad40 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb790adb0 a2=28 a3=0 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb790ab60 a2=50 a3=1 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit: BPF prog-id=176 op=LOAD May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb790ab60 a2=94 a3=5 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit: BPF prog-id=176 op=UNLOAD May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb790ac10 a2=50 a3=1 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb790ad30 a2=4 a3=38 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.669000 audit[4274]: AVC avc: denied { confidentiality } for pid=4274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.669000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb790ad80 a2=94 a3=6 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { confidentiality } for pid=4274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.670000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb790a530 a2=94 a3=83 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { perfmon } for pid=4274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { confidentiality } for pid=4274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:57:44.670000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb790a530 a2=94 a3=83 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb790bf70 a2=10 a3=208 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb790be10 a2=10 a3=3 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb790bdb0 a2=10 a3=3 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.670000 audit[4274]: AVC avc: denied { bpf } for pid=4274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:44.670000 audit[4274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb790bdb0 a2=10 a3=7 items=0 ppid=4139 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:57:44.677000 audit: BPF prog-id=171 op=UNLOAD May 15 00:57:44.715000 audit[4300]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.720468 kernel: kauditd_printk_skb: 694 callbacks suppressed May 15 00:57:44.720585 kernel: audit: type=1325 audit(1747270664.715:1283): table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.725882 kernel: audit: type=1300 audit(1747270664.715:1283): arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff64b9dcb0 a2=0 a3=7fff64b9dc9c items=0 ppid=4139 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.715000 audit[4300]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff64b9dcb0 a2=0 a3=7fff64b9dc9c items=0 ppid=4139 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.728992 kernel: audit: type=1327 audit(1747270664.715:1283): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.729000 audit[4302]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.729000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffe5645600 a2=0 a3=7fffe56455ec items=0 ppid=4139 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.737790 kernel: audit: type=1325 audit(1747270664.729:1284): table=filter:102 family=2 entries=39 op=nft_register_chain pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.737903 kernel: audit: type=1300 audit(1747270664.729:1284): arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffe5645600 a2=0 a3=7fffe56455ec items=0 ppid=4139 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.738297 kernel: audit: type=1327 audit(1747270664.729:1284): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.729000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.729000 audit[4305]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=4305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.747239 kernel: audit: type=1325 audit(1747270664.729:1285): table=nat:103 family=2 entries=15 op=nft_register_chain pid=4305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.747282 kernel: audit: type=1300 audit(1747270664.729:1285): arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc0a091290 a2=0 a3=559e95d60000 items=0 ppid=4139 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.729000 audit[4305]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc0a091290 a2=0 a3=559e95d60000 items=0 ppid=4139 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.729000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.756662 kernel: audit: type=1327 audit(1747270664.729:1285): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.746000 audit[4301]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=4301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.746000 audit[4301]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd53b40af0 a2=0 a3=7ffd53b40adc items=0 ppid=4139 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:44.760819 kernel: audit: type=1325 audit(1747270664.746:1286): table=raw:104 family=2 entries=21 op=nft_register_chain pid=4301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:44.805623 kubelet[1952]: E0515 00:57:44.805597 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:44.868809 systemd[1]: Started sshd@19-10.0.0.118:22-10.0.0.1:56658.service. May 15 00:57:44.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:44.911000 audit[4331]: USER_ACCT pid=4331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:44.912973 sshd[4331]: Accepted publickey for core from 10.0.0.1 port 56658 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:44.912000 audit[4331]: CRED_ACQ pid=4331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:44.913000 audit[4331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccf231ec0 a2=3 a3=0 items=0 ppid=1 pid=4331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:44.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:44.914162 sshd[4331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:44.917691 systemd-logind[1187]: New session 20 of user core. May 15 00:57:44.918411 systemd[1]: Started session-20.scope. May 15 00:57:44.921000 audit[4331]: USER_START pid=4331 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:44.922000 audit[4333]: CRED_ACQ pid=4333 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:45.030868 sshd[4331]: pam_unix(sshd:session): session closed for user core May 15 00:57:45.031000 audit[4331]: USER_END pid=4331 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:45.031000 audit[4331]: CRED_DISP pid=4331 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:45.033247 systemd[1]: sshd@19-10.0.0.118:22-10.0.0.1:56658.service: Deactivated successfully. May 15 00:57:45.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:45.033970 systemd[1]: session-20.scope: Deactivated successfully. May 15 00:57:45.034684 systemd-logind[1187]: Session 20 logged out. Waiting for processes to exit. May 15 00:57:45.035334 systemd-logind[1187]: Removed session 20. May 15 00:57:46.482966 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL May 15 00:57:47.414847 env[1201]: time="2025-05-15T00:57:47.414800740Z" level=info msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\"" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.457 [INFO][4363] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.458 [INFO][4363] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" iface="eth0" netns="/var/run/netns/cni-411d2fcd-882a-33fd-d1b1-1dd724b9bec6" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.458 [INFO][4363] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" iface="eth0" netns="/var/run/netns/cni-411d2fcd-882a-33fd-d1b1-1dd724b9bec6" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.458 [INFO][4363] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" iface="eth0" netns="/var/run/netns/cni-411d2fcd-882a-33fd-d1b1-1dd724b9bec6" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.458 [INFO][4363] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.458 [INFO][4363] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.481 [INFO][4372] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" HandleID="k8s-pod-network.7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" Workload="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.481 [INFO][4372] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.481 [INFO][4372] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.489 [WARNING][4372] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" HandleID="k8s-pod-network.7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" Workload="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.489 [INFO][4372] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" HandleID="k8s-pod-network.7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" Workload="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.490 [INFO][4372] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:47.493469 env[1201]: 2025-05-15 00:57:47.492 [INFO][4363] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b" May 15 00:57:47.495493 systemd[1]: run-netns-cni\x2d411d2fcd\x2d882a\x2d33fd\x2dd1b1\x2d1dd724b9bec6.mount: Deactivated successfully. May 15 00:57:47.496180 env[1201]: time="2025-05-15T00:57:47.496147753Z" level=info msg="TearDown network for sandbox \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\" successfully" May 15 00:57:47.496207 env[1201]: time="2025-05-15T00:57:47.496182108Z" level=info msg="StopPodSandbox for \"7cd6192781736011f0cdc03bcbd868afe1da676d9d189b73a02dffc91865cf5b\" returns successfully" May 15 00:57:47.496533 kubelet[1952]: E0515 00:57:47.496501 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:47.497001 env[1201]: time="2025-05-15T00:57:47.496965010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vql69,Uid:1938aa66-e571-4496-bebb-744c342d6aef,Namespace:kube-system,Attempt:1,}" May 15 00:57:47.698308 systemd-networkd[1018]: cali70fe0a12630: Link UP May 15 00:57:47.700314 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:57:47.700365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali70fe0a12630: link becomes ready May 15 00:57:47.700452 systemd-networkd[1018]: cali70fe0a12630: Gained carrier May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.626 [INFO][4380] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--vql69-eth0 coredns-668d6bf9bc- kube-system 1938aa66-e571-4496-bebb-744c342d6aef 1095 0 2025-05-15 00:56:34 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-vql69 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali70fe0a12630 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.627 [INFO][4380] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.650 [INFO][4395] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" HandleID="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Workload="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.658 [INFO][4395] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" HandleID="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Workload="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dc90), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-vql69", "timestamp":"2025-05-15 00:57:47.650979472 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.658 [INFO][4395] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.658 [INFO][4395] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.658 [INFO][4395] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.660 [INFO][4395] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.663 [INFO][4395] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.667 [INFO][4395] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.668 [INFO][4395] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.670 [INFO][4395] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.670 [INFO][4395] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.671 [INFO][4395] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460 May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.689 [INFO][4395] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.694 [INFO][4395] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.694 [INFO][4395] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" host="localhost" May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.694 [INFO][4395] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:47.802619 env[1201]: 2025-05-15 00:57:47.694 [INFO][4395] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" HandleID="k8s-pod-network.a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Workload="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.803259 env[1201]: 2025-05-15 00:57:47.696 [INFO][4380] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--vql69-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1938aa66-e571-4496-bebb-744c342d6aef", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-vql69", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali70fe0a12630", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:47.803259 env[1201]: 2025-05-15 00:57:47.696 [INFO][4380] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.803259 env[1201]: 2025-05-15 00:57:47.696 [INFO][4380] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali70fe0a12630 ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.803259 env[1201]: 2025-05-15 00:57:47.700 [INFO][4380] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.803259 env[1201]: 2025-05-15 00:57:47.700 [INFO][4380] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--vql69-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1938aa66-e571-4496-bebb-744c342d6aef", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460", Pod:"coredns-668d6bf9bc-vql69", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali70fe0a12630", MAC:"4e:01:0a:79:08:a0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:47.803259 env[1201]: 2025-05-15 00:57:47.800 [INFO][4380] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460" Namespace="kube-system" Pod="coredns-668d6bf9bc-vql69" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--vql69-eth0" May 15 00:57:47.811000 audit[4416]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=4416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:47.811000 audit[4416]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffef255c430 a2=0 a3=7ffef255c41c items=0 ppid=4139 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:47.811000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:47.912333 env[1201]: time="2025-05-15T00:57:47.912225172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:47.912333 env[1201]: time="2025-05-15T00:57:47.912292248Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:47.912333 env[1201]: time="2025-05-15T00:57:47.912310683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:47.912593 env[1201]: time="2025-05-15T00:57:47.912529284Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460 pid=4425 runtime=io.containerd.runc.v2 May 15 00:57:47.932252 systemd[1]: Started cri-containerd-a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460.scope. May 15 00:57:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit: BPF prog-id=177 op=LOAD May 15 00:57:47.942000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4425 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:47.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137663466306430373439343936653861393132323731396539363731 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4425 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:47.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137663466306430373439343936653861393132323731396539363731 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.942000 audit: BPF prog-id=178 op=LOAD May 15 00:57:47.942000 audit[4435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002f8550 items=0 ppid=4425 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:47.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137663466306430373439343936653861393132323731396539363731 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit: BPF prog-id=179 op=LOAD May 15 00:57:47.943000 audit[4435]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002f8598 items=0 ppid=4425 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:47.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137663466306430373439343936653861393132323731396539363731 May 15 00:57:47.943000 audit: BPF prog-id=179 op=UNLOAD May 15 00:57:47.943000 audit: BPF prog-id=178 op=UNLOAD May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { perfmon } for pid=4435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit[4435]: AVC avc: denied { bpf } for pid=4435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:47.943000 audit: BPF prog-id=180 op=LOAD May 15 00:57:47.943000 audit[4435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002f89a8 items=0 ppid=4425 pid=4435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:47.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137663466306430373439343936653861393132323731396539363731 May 15 00:57:47.944575 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:47.969864 env[1201]: time="2025-05-15T00:57:47.967583356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vql69,Uid:1938aa66-e571-4496-bebb-744c342d6aef,Namespace:kube-system,Attempt:1,} returns sandbox id \"a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460\"" May 15 00:57:47.970786 kubelet[1952]: E0515 00:57:47.970748 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:47.972431 env[1201]: time="2025-05-15T00:57:47.972390401Z" level=info msg="CreateContainer within sandbox \"a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 00:57:47.993789 env[1201]: time="2025-05-15T00:57:47.993710055Z" level=info msg="CreateContainer within sandbox \"a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c5fa5cd7636972f4da7ded9cbda3d9f70c0dd53f117797ff07311ce659d27971\"" May 15 00:57:47.994286 env[1201]: time="2025-05-15T00:57:47.994241204Z" level=info msg="StartContainer for \"c5fa5cd7636972f4da7ded9cbda3d9f70c0dd53f117797ff07311ce659d27971\"" May 15 00:57:48.007555 systemd[1]: Started cri-containerd-c5fa5cd7636972f4da7ded9cbda3d9f70c0dd53f117797ff07311ce659d27971.scope. May 15 00:57:48.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.020000 audit: BPF prog-id=181 op=LOAD May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4425 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335666135636437363336393732663464613764656439636264613364 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4425 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335666135636437363336393732663464613764656439636264613364 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit: BPF prog-id=182 op=LOAD May 15 00:57:48.021000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028cca0 items=0 ppid=4425 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335666135636437363336393732663464613764656439636264613364 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit: BPF prog-id=183 op=LOAD May 15 00:57:48.021000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028cce8 items=0 ppid=4425 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335666135636437363336393732663464613764656439636264613364 May 15 00:57:48.021000 audit: BPF prog-id=183 op=UNLOAD May 15 00:57:48.021000 audit: BPF prog-id=182 op=UNLOAD May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { perfmon } for pid=4465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit[4465]: AVC avc: denied { bpf } for pid=4465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.021000 audit: BPF prog-id=184 op=LOAD May 15 00:57:48.021000 audit[4465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028d0f8 items=0 ppid=4425 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335666135636437363336393732663464613764656439636264613364 May 15 00:57:48.035904 env[1201]: time="2025-05-15T00:57:48.035850342Z" level=info msg="StartContainer for \"c5fa5cd7636972f4da7ded9cbda3d9f70c0dd53f117797ff07311ce659d27971\" returns successfully" May 15 00:57:48.070000 audit[4476]: AVC avc: denied { getattr } for pid=4476 comm="coredns" path="cgroup:[4026532636]" dev="nsfs" ino=4026532636 scontext=system_u:system_r:svirt_lxc_net_t:s0:c526,c701 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 00:57:48.070000 audit[4476]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c00011ced8 a3=0 items=0 ppid=4425 pid=4476 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c526,c701 key=(null) May 15 00:57:48.070000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 00:57:48.415127 env[1201]: time="2025-05-15T00:57:48.415016209Z" level=info msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\"" May 15 00:57:48.415497 env[1201]: time="2025-05-15T00:57:48.415181780Z" level=info msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\"" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.462 [INFO][4530] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.462 [INFO][4530] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" iface="eth0" netns="/var/run/netns/cni-d9159bc1-f257-581b-debd-4b5ccf295665" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.462 [INFO][4530] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" iface="eth0" netns="/var/run/netns/cni-d9159bc1-f257-581b-debd-4b5ccf295665" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.462 [INFO][4530] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" iface="eth0" netns="/var/run/netns/cni-d9159bc1-f257-581b-debd-4b5ccf295665" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.462 [INFO][4530] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.462 [INFO][4530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.482 [INFO][4547] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" HandleID="k8s-pod-network.1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" Workload="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.482 [INFO][4547] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.482 [INFO][4547] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.487 [WARNING][4547] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" HandleID="k8s-pod-network.1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" Workload="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.487 [INFO][4547] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" HandleID="k8s-pod-network.1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" Workload="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.488 [INFO][4547] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:48.492750 env[1201]: 2025-05-15 00:57:48.489 [INFO][4530] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e" May 15 00:57:48.492750 env[1201]: time="2025-05-15T00:57:48.492621533Z" level=info msg="TearDown network for sandbox \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\" successfully" May 15 00:57:48.492750 env[1201]: time="2025-05-15T00:57:48.492652691Z" level=info msg="StopPodSandbox for \"1190def3abb891def985dcef484ec0f890f5acb4e53dd2e90571c5f50f702e5e\" returns successfully" May 15 00:57:48.493486 env[1201]: time="2025-05-15T00:57:48.493453738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8b5hz,Uid:c5fc9436-49d5-4858-9e14-f9808a9046d4,Namespace:calico-system,Attempt:1,}" May 15 00:57:48.496318 systemd[1]: run-containerd-runc-k8s.io-a7f4f0d0749496e8a9122719e9671b5c0d0207281a7b13fe67ea3170d942c460-runc.Cee7nS.mount: Deactivated successfully. May 15 00:57:48.496406 systemd[1]: run-netns-cni\x2dd9159bc1\x2df257\x2d581b\x2ddebd\x2d4b5ccf295665.mount: Deactivated successfully. May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.462 [INFO][4529] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.462 [INFO][4529] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" iface="eth0" netns="/var/run/netns/cni-d7ac67d1-b941-a39d-75a6-7829148b77ad" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.462 [INFO][4529] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" iface="eth0" netns="/var/run/netns/cni-d7ac67d1-b941-a39d-75a6-7829148b77ad" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.462 [INFO][4529] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" iface="eth0" netns="/var/run/netns/cni-d7ac67d1-b941-a39d-75a6-7829148b77ad" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.462 [INFO][4529] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.462 [INFO][4529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.482 [INFO][4548] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" HandleID="k8s-pod-network.c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" Workload="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.482 [INFO][4548] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.488 [INFO][4548] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.493 [WARNING][4548] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" HandleID="k8s-pod-network.c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" Workload="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.493 [INFO][4548] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" HandleID="k8s-pod-network.c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" Workload="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.494 [INFO][4548] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:48.498963 env[1201]: 2025-05-15 00:57:48.497 [INFO][4529] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b" May 15 00:57:48.499354 env[1201]: time="2025-05-15T00:57:48.499088694Z" level=info msg="TearDown network for sandbox \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\" successfully" May 15 00:57:48.499354 env[1201]: time="2025-05-15T00:57:48.499112759Z" level=info msg="StopPodSandbox for \"c492dfb3bafc1a7f18220b6604181e411c440518a6e1adff6133c5fcdd29900b\" returns successfully" May 15 00:57:48.499432 kubelet[1952]: E0515 00:57:48.499381 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:48.500215 env[1201]: time="2025-05-15T00:57:48.500177222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-2sdq7,Uid:628d39ea-73a2-4f12-a393-62eacd958aa6,Namespace:kube-system,Attempt:1,}" May 15 00:57:48.500928 systemd[1]: run-netns-cni\x2dd7ac67d1\x2db941\x2da39d\x2d75a6\x2d7829148b77ad.mount: Deactivated successfully. May 15 00:57:48.648199 systemd-networkd[1018]: calide15f42cb95: Link UP May 15 00:57:48.649524 systemd-networkd[1018]: calide15f42cb95: Gained carrier May 15 00:57:48.649789 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calide15f42cb95: link becomes ready May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.572 [INFO][4563] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0 coredns-668d6bf9bc- kube-system 628d39ea-73a2-4f12-a393-62eacd958aa6 1114 0 2025-05-15 00:56:34 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-2sdq7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calide15f42cb95 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.572 [INFO][4563] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.612 [INFO][4598] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" HandleID="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Workload="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.620 [INFO][4598] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" HandleID="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Workload="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003e33d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-2sdq7", "timestamp":"2025-05-15 00:57:48.612647778 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.620 [INFO][4598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.620 [INFO][4598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.620 [INFO][4598] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.622 [INFO][4598] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.625 [INFO][4598] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.629 [INFO][4598] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.630 [INFO][4598] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.632 [INFO][4598] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.632 [INFO][4598] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.633 [INFO][4598] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4 May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.640 [INFO][4598] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.644 [INFO][4598] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.644 [INFO][4598] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" host="localhost" May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.644 [INFO][4598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:48.660311 env[1201]: 2025-05-15 00:57:48.644 [INFO][4598] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" HandleID="k8s-pod-network.051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Workload="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.661079 env[1201]: 2025-05-15 00:57:48.646 [INFO][4563] cni-plugin/k8s.go 386: Populated endpoint ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"628d39ea-73a2-4f12-a393-62eacd958aa6", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-2sdq7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calide15f42cb95", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:48.661079 env[1201]: 2025-05-15 00:57:48.646 [INFO][4563] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.661079 env[1201]: 2025-05-15 00:57:48.646 [INFO][4563] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calide15f42cb95 ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.661079 env[1201]: 2025-05-15 00:57:48.649 [INFO][4563] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.661079 env[1201]: 2025-05-15 00:57:48.650 [INFO][4563] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"628d39ea-73a2-4f12-a393-62eacd958aa6", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4", Pod:"coredns-668d6bf9bc-2sdq7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calide15f42cb95", MAC:"de:06:81:30:36:36", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:48.661079 env[1201]: 2025-05-15 00:57:48.657 [INFO][4563] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4" Namespace="kube-system" Pod="coredns-668d6bf9bc-2sdq7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--2sdq7-eth0" May 15 00:57:48.667000 audit[4623]: NETFILTER_CFG table=filter:106 family=2 entries=30 op=nft_register_chain pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:48.667000 audit[4623]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffc5f492ab0 a2=0 a3=7ffc5f492a9c items=0 ppid=4139 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.667000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:48.700406 env[1201]: time="2025-05-15T00:57:48.700335080Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:48.700406 env[1201]: time="2025-05-15T00:57:48.700374435Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:48.700406 env[1201]: time="2025-05-15T00:57:48.700385506Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:48.700644 env[1201]: time="2025-05-15T00:57:48.700518836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4 pid=4630 runtime=io.containerd.runc.v2 May 15 00:57:48.711438 systemd[1]: Started cri-containerd-051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4.scope. May 15 00:57:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.723000 audit: BPF prog-id=185 op=LOAD May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4630 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035316531303739313534373236623733333232396432303162653238 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4630 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035316531303739313534373236623733333232396432303162653238 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit: BPF prog-id=186 op=LOAD May 15 00:57:48.724000 audit[4641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000299330 items=0 ppid=4630 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035316531303739313534373236623733333232396432303162653238 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.724000 audit: BPF prog-id=187 op=LOAD May 15 00:57:48.724000 audit[4641]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000299378 items=0 ppid=4630 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035316531303739313534373236623733333232396432303162653238 May 15 00:57:48.724000 audit: BPF prog-id=187 op=UNLOAD May 15 00:57:48.725000 audit: BPF prog-id=186 op=UNLOAD May 15 00:57:48.725000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { perfmon } for pid=4641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit[4641]: AVC avc: denied { bpf } for pid=4641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.725000 audit: BPF prog-id=188 op=LOAD May 15 00:57:48.725000 audit[4641]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000299788 items=0 ppid=4630 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035316531303739313534373236623733333232396432303162653238 May 15 00:57:48.727082 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:48.754734 env[1201]: time="2025-05-15T00:57:48.754691656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-2sdq7,Uid:628d39ea-73a2-4f12-a393-62eacd958aa6,Namespace:kube-system,Attempt:1,} returns sandbox id \"051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4\"" May 15 00:57:48.755245 systemd-networkd[1018]: cali1060c5cc93a: Link UP May 15 00:57:48.755902 kubelet[1952]: E0515 00:57:48.755873 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:48.758102 env[1201]: time="2025-05-15T00:57:48.758054480Z" level=info msg="CreateContainer within sandbox \"051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 00:57:48.758295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:57:48.758369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1060c5cc93a: link becomes ready May 15 00:57:48.758663 systemd-networkd[1018]: cali1060c5cc93a: Gained carrier May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.569 [INFO][4565] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--8b5hz-eth0 csi-node-driver- calico-system c5fc9436-49d5-4858-9e14-f9808a9046d4 1113 0 2025-05-15 00:56:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-8b5hz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1060c5cc93a [] []}} ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.570 [INFO][4565] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.614 [INFO][4593] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" HandleID="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Workload="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.621 [INFO][4593] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" HandleID="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Workload="localhost-k8s-csi--node--driver--8b5hz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002647d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-8b5hz", "timestamp":"2025-05-15 00:57:48.614714053 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.621 [INFO][4593] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.644 [INFO][4593] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.644 [INFO][4593] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.724 [INFO][4593] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.732 [INFO][4593] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.736 [INFO][4593] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.738 [INFO][4593] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.740 [INFO][4593] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.740 [INFO][4593] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.741 [INFO][4593] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.744 [INFO][4593] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.750 [INFO][4593] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.750 [INFO][4593] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" host="localhost" May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.751 [INFO][4593] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:48.771955 env[1201]: 2025-05-15 00:57:48.751 [INFO][4593] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" HandleID="k8s-pod-network.3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Workload="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.772686 env[1201]: 2025-05-15 00:57:48.752 [INFO][4565] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8b5hz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c5fc9436-49d5-4858-9e14-f9808a9046d4", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-8b5hz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1060c5cc93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:48.772686 env[1201]: 2025-05-15 00:57:48.753 [INFO][4565] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.772686 env[1201]: 2025-05-15 00:57:48.753 [INFO][4565] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1060c5cc93a ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.772686 env[1201]: 2025-05-15 00:57:48.755 [INFO][4565] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.772686 env[1201]: 2025-05-15 00:57:48.755 [INFO][4565] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8b5hz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c5fc9436-49d5-4858-9e14-f9808a9046d4", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa", Pod:"csi-node-driver-8b5hz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1060c5cc93a", MAC:"26:0c:6d:80:b1:5c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:48.772686 env[1201]: 2025-05-15 00:57:48.767 [INFO][4565] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa" Namespace="calico-system" Pod="csi-node-driver-8b5hz" WorkloadEndpoint="localhost-k8s-csi--node--driver--8b5hz-eth0" May 15 00:57:48.772000 audit[4667]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:48.772000 audit[4667]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffd24eda6e0 a2=0 a3=7ffd24eda6cc items=0 ppid=4139 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.772000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:48.784478 env[1201]: time="2025-05-15T00:57:48.784425860Z" level=info msg="CreateContainer within sandbox \"051e1079154726b733229d201be28d54fe139e2beea5454f412cac1f14e798c4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3b1b7866a3a25b7462383ddbfefde5e34bdd2e165a2901d6ee9b94524635e430\"" May 15 00:57:48.785593 env[1201]: time="2025-05-15T00:57:48.785016992Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:48.785593 env[1201]: time="2025-05-15T00:57:48.785047259Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:48.785593 env[1201]: time="2025-05-15T00:57:48.785064301Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:48.785593 env[1201]: time="2025-05-15T00:57:48.785203752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa pid=4686 runtime=io.containerd.runc.v2 May 15 00:57:48.785939 env[1201]: time="2025-05-15T00:57:48.785895553Z" level=info msg="StartContainer for \"3b1b7866a3a25b7462383ddbfefde5e34bdd2e165a2901d6ee9b94524635e430\"" May 15 00:57:48.794964 systemd[1]: Started cri-containerd-3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa.scope. May 15 00:57:48.800470 systemd[1]: Started cri-containerd-3b1b7866a3a25b7462383ddbfefde5e34bdd2e165a2901d6ee9b94524635e430.scope. May 15 00:57:48.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.805000 audit: BPF prog-id=189 op=LOAD May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4686 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663961633362636436303330303664643032353863613061373434 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4686 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663961633362636436303330303664643032353863613061373434 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit: BPF prog-id=190 op=LOAD May 15 00:57:48.806000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000205140 items=0 ppid=4686 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663961633362636436303330303664643032353863613061373434 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit: BPF prog-id=191 op=LOAD May 15 00:57:48.806000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000205188 items=0 ppid=4686 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663961633362636436303330303664643032353863613061373434 May 15 00:57:48.806000 audit: BPF prog-id=191 op=UNLOAD May 15 00:57:48.806000 audit: BPF prog-id=190 op=UNLOAD May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.806000 audit: BPF prog-id=192 op=LOAD May 15 00:57:48.806000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000205598 items=0 ppid=4686 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663961633362636436303330303664643032353863613061373434 May 15 00:57:48.808737 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit: BPF prog-id=193 op=LOAD May 15 00:57:48.809000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4630 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316237383636613361323562373436323338336464626665666465 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4630 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316237383636613361323562373436323338336464626665666465 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.809000 audit: BPF prog-id=194 op=LOAD May 15 00:57:48.809000 audit[4707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a7220 items=0 ppid=4630 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316237383636613361323562373436323338336464626665666465 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit: BPF prog-id=195 op=LOAD May 15 00:57:48.810000 audit[4707]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a7268 items=0 ppid=4630 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316237383636613361323562373436323338336464626665666465 May 15 00:57:48.810000 audit: BPF prog-id=195 op=UNLOAD May 15 00:57:48.810000 audit: BPF prog-id=194 op=UNLOAD May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:48.810000 audit: BPF prog-id=196 op=LOAD May 15 00:57:48.810000 audit[4707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a7678 items=0 ppid=4630 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316237383636613361323562373436323338336464626665666465 May 15 00:57:48.817031 kubelet[1952]: E0515 00:57:48.816511 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:48.829999 env[1201]: time="2025-05-15T00:57:48.829932433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8b5hz,Uid:c5fc9436-49d5-4858-9e14-f9808a9046d4,Namespace:calico-system,Attempt:1,} returns sandbox id \"3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa\"" May 15 00:57:48.830546 env[1201]: time="2025-05-15T00:57:48.830517453Z" level=info msg="StartContainer for \"3b1b7866a3a25b7462383ddbfefde5e34bdd2e165a2901d6ee9b94524635e430\" returns successfully" May 15 00:57:48.832075 env[1201]: time="2025-05-15T00:57:48.832047130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 00:57:48.842000 audit[4728]: AVC avc: denied { getattr } for pid=4728 comm="coredns" path="cgroup:[4026532315]" dev="nsfs" ino=4026532315 scontext=system_u:system_r:svirt_lxc_net_t:s0:c396,c986 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 00:57:48.842000 audit[4728]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0000d0b88 a2=c00011c518 a3=0 items=0 ppid=4630 pid=4728 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c396,c986 key=(null) May 15 00:57:48.842000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 00:57:48.844910 kubelet[1952]: I0515 00:57:48.844644 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-vql69" podStartSLOduration=74.84462436 podStartE2EDuration="1m14.84462436s" podCreationTimestamp="2025-05-15 00:56:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:57:48.829617621 +0000 UTC m=+81.485491756" watchObservedRunningTime="2025-05-15 00:57:48.84462436 +0000 UTC m=+81.500498495" May 15 00:57:48.853000 audit[4755]: NETFILTER_CFG table=filter:108 family=2 entries=16 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.853000 audit[4755]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffff12174e0 a2=0 a3=7ffff12174cc items=0 ppid=2140 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:48.862000 audit[4755]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.862000 audit[4755]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffff12174e0 a2=0 a3=0 items=0 ppid=2140 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:48.879000 audit[4761]: NETFILTER_CFG table=filter:110 family=2 entries=13 op=nft_register_rule pid=4761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.879000 audit[4761]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcef88f0d0 a2=0 a3=7ffcef88f0bc items=0 ppid=2140 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:48.889000 audit[4761]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=4761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:48.889000 audit[4761]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcef88f0d0 a2=0 a3=7ffcef88f0bc items=0 ppid=2140 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:48.889000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:49.362951 systemd-networkd[1018]: cali70fe0a12630: Gained IPv6LL May 15 00:57:49.415053 env[1201]: time="2025-05-15T00:57:49.415001028Z" level=info msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\"" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.552 [INFO][4778] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.552 [INFO][4778] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" iface="eth0" netns="/var/run/netns/cni-cf411773-65e3-0fd6-5c07-af27a2cf390e" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.552 [INFO][4778] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" iface="eth0" netns="/var/run/netns/cni-cf411773-65e3-0fd6-5c07-af27a2cf390e" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.553 [INFO][4778] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" iface="eth0" netns="/var/run/netns/cni-cf411773-65e3-0fd6-5c07-af27a2cf390e" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.553 [INFO][4778] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.553 [INFO][4778] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.570 [INFO][4786] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" HandleID="k8s-pod-network.61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" Workload="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.570 [INFO][4786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.570 [INFO][4786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.575 [WARNING][4786] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" HandleID="k8s-pod-network.61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" Workload="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.575 [INFO][4786] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" HandleID="k8s-pod-network.61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" Workload="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.576 [INFO][4786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:49.579804 env[1201]: 2025-05-15 00:57:49.578 [INFO][4778] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6" May 15 00:57:49.580453 env[1201]: time="2025-05-15T00:57:49.579935562Z" level=info msg="TearDown network for sandbox \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\" successfully" May 15 00:57:49.580453 env[1201]: time="2025-05-15T00:57:49.579969135Z" level=info msg="StopPodSandbox for \"61f3f2aa69eaab227cf7f254b45ccfb2b15c10b8aa09d0291f56e51a930fb2e6\" returns successfully" May 15 00:57:49.582037 systemd[1]: run-netns-cni\x2dcf411773\x2d65e3\x2d0fd6\x2d5c07\x2daf27a2cf390e.mount: Deactivated successfully. May 15 00:57:49.582464 env[1201]: time="2025-05-15T00:57:49.582425566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55fd84bbd9-6tkvx,Uid:de5f883d-944b-478c-823a-9f80a77fd7ec,Namespace:calico-system,Attempt:1,}" May 15 00:57:49.810921 systemd-networkd[1018]: calide15f42cb95: Gained IPv6LL May 15 00:57:49.825674 kubelet[1952]: E0515 00:57:49.825636 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:49.826060 kubelet[1952]: E0515 00:57:49.825702 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:49.970335 kubelet[1952]: I0515 00:57:49.970249 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-2sdq7" podStartSLOduration=75.970198473 podStartE2EDuration="1m15.970198473s" podCreationTimestamp="2025-05-15 00:56:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:57:49.970101711 +0000 UTC m=+82.625975836" watchObservedRunningTime="2025-05-15 00:57:49.970198473 +0000 UTC m=+82.626072609" May 15 00:57:49.981000 audit[4814]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:49.983130 kernel: kauditd_printk_skb: 325 callbacks suppressed May 15 00:57:49.983263 kernel: audit: type=1325 audit(1747270669.981:1395): table=filter:112 family=2 entries=10 op=nft_register_rule pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:49.993311 kernel: audit: type=1300 audit(1747270669.981:1395): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe932e8770 a2=0 a3=7ffe932e875c items=0 ppid=2140 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:49.993394 kernel: audit: type=1327 audit(1747270669.981:1395): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:49.981000 audit[4814]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe932e8770 a2=0 a3=7ffe932e875c items=0 ppid=2140 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:49.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:49.994000 audit[4814]: NETFILTER_CFG table=nat:113 family=2 entries=44 op=nft_register_rule pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:49.994000 audit[4814]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe932e8770 a2=0 a3=7ffe932e875c items=0 ppid=2140 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.003002 systemd-networkd[1018]: cali1060c5cc93a: Gained IPv6LL May 15 00:57:50.003372 kernel: audit: type=1325 audit(1747270669.994:1396): table=nat:113 family=2 entries=44 op=nft_register_rule pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:50.003416 kernel: audit: type=1300 audit(1747270669.994:1396): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe932e8770 a2=0 a3=7ffe932e875c items=0 ppid=2140 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:49.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:50.008790 kernel: audit: type=1327 audit(1747270669.994:1396): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:50.036536 systemd[1]: Started sshd@20-10.0.0.118:22-10.0.0.1:39344.service. May 15 00:57:50.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:39344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:50.042789 kernel: audit: type=1130 audit(1747270670.035:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:39344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:50.048317 systemd-networkd[1018]: cali65b3e754f93: Link UP May 15 00:57:50.050799 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:57:50.050897 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali65b3e754f93: link becomes ready May 15 00:57:50.051219 systemd-networkd[1018]: cali65b3e754f93: Gained carrier May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:49.974 [INFO][4799] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0 calico-kube-controllers-55fd84bbd9- calico-system de5f883d-944b-478c-823a-9f80a77fd7ec 1140 0 2025-05-15 00:56:40 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55fd84bbd9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-55fd84bbd9-6tkvx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali65b3e754f93 [] []}} ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:49.975 [INFO][4799] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.007 [INFO][4816] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" HandleID="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Workload="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.014 [INFO][4816] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" HandleID="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Workload="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00028c590), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-55fd84bbd9-6tkvx", "timestamp":"2025-05-15 00:57:50.007390687 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.015 [INFO][4816] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.015 [INFO][4816] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.015 [INFO][4816] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.016 [INFO][4816] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.020 [INFO][4816] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.023 [INFO][4816] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.024 [INFO][4816] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.026 [INFO][4816] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.026 [INFO][4816] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.027 [INFO][4816] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78 May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.030 [INFO][4816] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.044 [INFO][4816] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.044 [INFO][4816] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" host="localhost" May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.044 [INFO][4816] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:50.067101 env[1201]: 2025-05-15 00:57:50.044 [INFO][4816] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" HandleID="k8s-pod-network.ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Workload="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.067851 env[1201]: 2025-05-15 00:57:50.046 [INFO][4799] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0", GenerateName:"calico-kube-controllers-55fd84bbd9-", Namespace:"calico-system", SelfLink:"", UID:"de5f883d-944b-478c-823a-9f80a77fd7ec", ResourceVersion:"1140", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55fd84bbd9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-55fd84bbd9-6tkvx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali65b3e754f93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:50.067851 env[1201]: 2025-05-15 00:57:50.046 [INFO][4799] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.067851 env[1201]: 2025-05-15 00:57:50.046 [INFO][4799] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali65b3e754f93 ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.067851 env[1201]: 2025-05-15 00:57:50.052 [INFO][4799] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.067851 env[1201]: 2025-05-15 00:57:50.052 [INFO][4799] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0", GenerateName:"calico-kube-controllers-55fd84bbd9-", Namespace:"calico-system", SelfLink:"", UID:"de5f883d-944b-478c-823a-9f80a77fd7ec", ResourceVersion:"1140", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55fd84bbd9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78", Pod:"calico-kube-controllers-55fd84bbd9-6tkvx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali65b3e754f93", MAC:"4e:61:5f:14:29:fe", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:50.067851 env[1201]: 2025-05-15 00:57:50.064 [INFO][4799] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78" Namespace="calico-system" Pod="calico-kube-controllers-55fd84bbd9-6tkvx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55fd84bbd9--6tkvx-eth0" May 15 00:57:50.093000 audit[4841]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:50.093000 audit[4841]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffe581c75c0 a2=0 a3=7ffe581c75ac items=0 ppid=4139 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.104575 kernel: audit: type=1325 audit(1747270670.093:1398): table=filter:114 family=2 entries=42 op=nft_register_chain pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:50.104794 kernel: audit: type=1300 audit(1747270670.093:1398): arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffe581c75c0 a2=0 a3=7ffe581c75ac items=0 ppid=4139 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.093000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:50.108981 env[1201]: time="2025-05-15T00:57:50.108899207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:50.109232 env[1201]: time="2025-05-15T00:57:50.109175667Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:50.109232 env[1201]: time="2025-05-15T00:57:50.109196085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:50.109418 env[1201]: time="2025-05-15T00:57:50.109380262Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78 pid=4848 runtime=io.containerd.runc.v2 May 15 00:57:50.109792 kernel: audit: type=1327 audit(1747270670.093:1398): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:50.123000 audit[4825]: USER_ACCT pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:50.124205 sshd[4825]: Accepted publickey for core from 10.0.0.1 port 39344 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:50.124000 audit[4825]: CRED_ACQ pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:50.124000 audit[4825]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecff07110 a2=3 a3=0 items=0 ppid=1 pid=4825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.124000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:50.125936 sshd[4825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:50.126372 systemd[1]: Started cri-containerd-ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78.scope. May 15 00:57:50.132499 systemd[1]: Started session-21.scope. May 15 00:57:50.132807 systemd-logind[1187]: New session 21 of user core. May 15 00:57:50.137000 audit[4825]: USER_START pid=4825 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:50.138000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit: BPF prog-id=197 op=LOAD May 15 00:57:50.142000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261326665333631316263306537353235333732653030393761353766 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261326665333631316263306537353235333732653030393761353766 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.142000 audit: BPF prog-id=198 op=LOAD May 15 00:57:50.142000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003d2340 items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261326665333631316263306537353235333732653030393761353766 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit: BPF prog-id=199 op=LOAD May 15 00:57:50.143000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d2388 items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261326665333631316263306537353235333732653030393761353766 May 15 00:57:50.143000 audit: BPF prog-id=199 op=UNLOAD May 15 00:57:50.143000 audit: BPF prog-id=198 op=UNLOAD May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.143000 audit: BPF prog-id=200 op=LOAD May 15 00:57:50.143000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d2798 items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261326665333631316263306537353235333732653030393761353766 May 15 00:57:50.144670 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:50.171513 env[1201]: time="2025-05-15T00:57:50.171471198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55fd84bbd9-6tkvx,Uid:de5f883d-944b-478c-823a-9f80a77fd7ec,Namespace:calico-system,Attempt:1,} returns sandbox id \"ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78\"" May 15 00:57:50.262950 sshd[4825]: pam_unix(sshd:session): session closed for user core May 15 00:57:50.263000 audit[4825]: USER_END pid=4825 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:50.263000 audit[4825]: CRED_DISP pid=4825 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:50.265377 systemd[1]: sshd@20-10.0.0.118:22-10.0.0.1:39344.service: Deactivated successfully. May 15 00:57:50.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:39344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:50.266089 systemd[1]: session-21.scope: Deactivated successfully. May 15 00:57:50.266742 systemd-logind[1187]: Session 21 logged out. Waiting for processes to exit. May 15 00:57:50.267449 systemd-logind[1187]: Removed session 21. May 15 00:57:50.414839 env[1201]: time="2025-05-15T00:57:50.414699758Z" level=info msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\"" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.475 [INFO][4911] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.475 [INFO][4911] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" iface="eth0" netns="/var/run/netns/cni-becb0e1e-e8b3-fc2a-1cba-13f5d4255b71" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.475 [INFO][4911] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" iface="eth0" netns="/var/run/netns/cni-becb0e1e-e8b3-fc2a-1cba-13f5d4255b71" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.475 [INFO][4911] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" iface="eth0" netns="/var/run/netns/cni-becb0e1e-e8b3-fc2a-1cba-13f5d4255b71" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.475 [INFO][4911] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.476 [INFO][4911] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.501 [INFO][4919] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" HandleID="k8s-pod-network.c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" Workload="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.501 [INFO][4919] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.501 [INFO][4919] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.506 [WARNING][4919] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" HandleID="k8s-pod-network.c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" Workload="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.506 [INFO][4919] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" HandleID="k8s-pod-network.c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" Workload="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.507 [INFO][4919] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:50.511082 env[1201]: 2025-05-15 00:57:50.509 [INFO][4911] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe" May 15 00:57:50.513965 env[1201]: time="2025-05-15T00:57:50.513907558Z" level=info msg="TearDown network for sandbox \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\" successfully" May 15 00:57:50.513965 env[1201]: time="2025-05-15T00:57:50.513957683Z" level=info msg="StopPodSandbox for \"c89cd178b6a1f34f6c16860f151cf67982f2278d69318d2f92446e4e2a6c91fe\" returns successfully" May 15 00:57:50.514204 systemd[1]: run-netns-cni\x2dbecb0e1e\x2de8b3\x2dfc2a\x2d1cba\x2d13f5d4255b71.mount: Deactivated successfully. May 15 00:57:50.514711 env[1201]: time="2025-05-15T00:57:50.514665034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-hr7vc,Uid:845cb051-99b7-48ea-80e1-d20868b4ea6a,Namespace:calico-apiserver,Attempt:1,}" May 15 00:57:50.631524 env[1201]: time="2025-05-15T00:57:50.631447660Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:50.633267 env[1201]: time="2025-05-15T00:57:50.633237729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:50.634917 env[1201]: time="2025-05-15T00:57:50.634863709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:50.636379 env[1201]: time="2025-05-15T00:57:50.636348865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:50.636922 env[1201]: time="2025-05-15T00:57:50.636547088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 00:57:50.636941 systemd-networkd[1018]: cali7bbab3c52cf: Link UP May 15 00:57:50.638944 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7bbab3c52cf: link becomes ready May 15 00:57:50.638703 systemd-networkd[1018]: cali7bbab3c52cf: Gained carrier May 15 00:57:50.639130 env[1201]: time="2025-05-15T00:57:50.639067541Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 00:57:50.640268 env[1201]: time="2025-05-15T00:57:50.640246469Z" level=info msg="CreateContainer within sandbox \"3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.573 [INFO][4927] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0 calico-apiserver-59645c89cd- calico-apiserver 845cb051-99b7-48ea-80e1-d20868b4ea6a 1162 0 2025-05-15 00:56:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59645c89cd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-59645c89cd-hr7vc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7bbab3c52cf [] []}} ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.573 [INFO][4927] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.600 [INFO][4942] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" HandleID="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Workload="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.607 [INFO][4942] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" HandleID="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Workload="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00019d110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-59645c89cd-hr7vc", "timestamp":"2025-05-15 00:57:50.600308817 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.608 [INFO][4942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.608 [INFO][4942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.608 [INFO][4942] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.610 [INFO][4942] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.615 [INFO][4942] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.619 [INFO][4942] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.620 [INFO][4942] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.622 [INFO][4942] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.622 [INFO][4942] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.623 [INFO][4942] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31 May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.627 [INFO][4942] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.633 [INFO][4942] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.633 [INFO][4942] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" host="localhost" May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.633 [INFO][4942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:50.649535 env[1201]: 2025-05-15 00:57:50.633 [INFO][4942] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" HandleID="k8s-pod-network.6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Workload="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.650222 env[1201]: 2025-05-15 00:57:50.635 [INFO][4927] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0", GenerateName:"calico-apiserver-59645c89cd-", Namespace:"calico-apiserver", SelfLink:"", UID:"845cb051-99b7-48ea-80e1-d20868b4ea6a", ResourceVersion:"1162", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59645c89cd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-59645c89cd-hr7vc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7bbab3c52cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:50.650222 env[1201]: 2025-05-15 00:57:50.635 [INFO][4927] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.650222 env[1201]: 2025-05-15 00:57:50.635 [INFO][4927] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7bbab3c52cf ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.650222 env[1201]: 2025-05-15 00:57:50.638 [INFO][4927] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.650222 env[1201]: 2025-05-15 00:57:50.639 [INFO][4927] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0", GenerateName:"calico-apiserver-59645c89cd-", Namespace:"calico-apiserver", SelfLink:"", UID:"845cb051-99b7-48ea-80e1-d20868b4ea6a", ResourceVersion:"1162", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59645c89cd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31", Pod:"calico-apiserver-59645c89cd-hr7vc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7bbab3c52cf", MAC:"3a:30:fb:22:0c:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:50.650222 env[1201]: 2025-05-15 00:57:50.647 [INFO][4927] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-hr7vc" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--hr7vc-eth0" May 15 00:57:50.656000 audit[4963]: NETFILTER_CFG table=filter:115 family=2 entries=62 op=nft_register_chain pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:50.656000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=31096 a0=3 a1=7ffd74a05440 a2=0 a3=7ffd74a0542c items=0 ppid=4139 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.656000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:50.663623 env[1201]: time="2025-05-15T00:57:50.663559215Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:50.663623 env[1201]: time="2025-05-15T00:57:50.663600342Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:50.663623 env[1201]: time="2025-05-15T00:57:50.663612996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:50.663808 env[1201]: time="2025-05-15T00:57:50.663742560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31 pid=4972 runtime=io.containerd.runc.v2 May 15 00:57:50.664803 env[1201]: time="2025-05-15T00:57:50.664726752Z" level=info msg="CreateContainer within sandbox \"3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7f3bfa9f921de48800924a919f11d2305e72033770a26a2b5acccfb20b612107\"" May 15 00:57:50.665474 env[1201]: time="2025-05-15T00:57:50.665392896Z" level=info msg="StartContainer for \"7f3bfa9f921de48800924a919f11d2305e72033770a26a2b5acccfb20b612107\"" May 15 00:57:50.677364 systemd[1]: Started cri-containerd-6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31.scope. May 15 00:57:50.685026 systemd[1]: Started cri-containerd-7f3bfa9f921de48800924a919f11d2305e72033770a26a2b5acccfb20b612107.scope. May 15 00:57:50.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit: BPF prog-id=201 op=LOAD May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4972 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661396437663632646461316135643130303037653131333630353662 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4972 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661396437663632646461316135643130303037653131333630353662 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit: BPF prog-id=202 op=LOAD May 15 00:57:50.690000 audit[4982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000291200 items=0 ppid=4972 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661396437663632646461316135643130303037653131333630353662 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit: BPF prog-id=203 op=LOAD May 15 00:57:50.690000 audit[4982]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000291248 items=0 ppid=4972 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661396437663632646461316135643130303037653131333630353662 May 15 00:57:50.690000 audit: BPF prog-id=203 op=UNLOAD May 15 00:57:50.690000 audit: BPF prog-id=202 op=UNLOAD May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { perfmon } for pid=4982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit[4982]: AVC avc: denied { bpf } for pid=4982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.690000 audit: BPF prog-id=204 op=LOAD May 15 00:57:50.690000 audit[4982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000291658 items=0 ppid=4972 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661396437663632646461316135643130303037653131333630353662 May 15 00:57:50.692294 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f83492558c8 items=0 ppid=4686 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336266613966393231646534383830303932346139313966313164 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit: BPF prog-id=205 op=LOAD May 15 00:57:50.699000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000284e28 items=0 ppid=4686 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336266613966393231646534383830303932346139313966313164 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit: BPF prog-id=206 op=LOAD May 15 00:57:50.699000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000284e78 items=0 ppid=4686 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336266613966393231646534383830303932346139313966313164 May 15 00:57:50.699000 audit: BPF prog-id=206 op=UNLOAD May 15 00:57:50.699000 audit: BPF prog-id=205 op=UNLOAD May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:50.699000 audit: BPF prog-id=207 op=LOAD May 15 00:57:50.699000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000284f08 items=0 ppid=4686 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336266613966393231646534383830303932346139313966313164 May 15 00:57:50.719900 env[1201]: time="2025-05-15T00:57:50.719855215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-hr7vc,Uid:845cb051-99b7-48ea-80e1-d20868b4ea6a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31\"" May 15 00:57:50.737391 env[1201]: time="2025-05-15T00:57:50.737331676Z" level=info msg="StartContainer for \"7f3bfa9f921de48800924a919f11d2305e72033770a26a2b5acccfb20b612107\" returns successfully" May 15 00:57:50.832470 kubelet[1952]: E0515 00:57:50.832148 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:50.832470 kubelet[1952]: E0515 00:57:50.832278 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:50.854000 audit[5038]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:50.854000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffa3e78a40 a2=0 a3=7fffa3e78a2c items=0 ppid=2140 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:50.868000 audit[5038]: NETFILTER_CFG table=nat:117 family=2 entries=56 op=nft_register_chain pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:50.868000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffa3e78a40 a2=0 a3=7fffa3e78a2c items=0 ppid=2140 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:50.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:51.497503 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3861388802.mount: Deactivated successfully. May 15 00:57:51.730954 systemd-networkd[1018]: cali65b3e754f93: Gained IPv6LL May 15 00:57:51.846485 kubelet[1952]: E0515 00:57:51.846440 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:52.051006 systemd-networkd[1018]: cali7bbab3c52cf: Gained IPv6LL May 15 00:57:52.848923 kubelet[1952]: E0515 00:57:52.848877 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:53.018924 env[1201]: time="2025-05-15T00:57:53.018845233Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:53.022319 env[1201]: time="2025-05-15T00:57:53.022246221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:53.024914 env[1201]: time="2025-05-15T00:57:53.024881366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:53.026558 env[1201]: time="2025-05-15T00:57:53.026519021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:53.027030 env[1201]: time="2025-05-15T00:57:53.026990941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 00:57:53.028176 env[1201]: time="2025-05-15T00:57:53.028149915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 00:57:53.040364 env[1201]: time="2025-05-15T00:57:53.040325585Z" level=info msg="CreateContainer within sandbox \"ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 00:57:53.090227 env[1201]: time="2025-05-15T00:57:53.090173417Z" level=info msg="CreateContainer within sandbox \"ba2fe3611bc0e7525372e0097a57faa19d52cac076715f687fa90fafeb517e78\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f2ac992a42dbac4258eac304375d98089c9bb4dbfbf0840ffeeef430d34ac117\"" May 15 00:57:53.090806 env[1201]: time="2025-05-15T00:57:53.090783266Z" level=info msg="StartContainer for \"f2ac992a42dbac4258eac304375d98089c9bb4dbfbf0840ffeeef430d34ac117\"" May 15 00:57:53.104087 systemd[1]: Started cri-containerd-f2ac992a42dbac4258eac304375d98089c9bb4dbfbf0840ffeeef430d34ac117.scope. May 15 00:57:53.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit: BPF prog-id=208 op=LOAD May 15 00:57:53.117000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4848 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:53.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632616339393261343264626163343235386561633330343337356439 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4848 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:53.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632616339393261343264626163343235386561633330343337356439 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.117000 audit: BPF prog-id=209 op=LOAD May 15 00:57:53.117000 audit[5049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d8020 items=0 ppid=4848 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:53.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632616339393261343264626163343235386561633330343337356439 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit: BPF prog-id=210 op=LOAD May 15 00:57:53.118000 audit[5049]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d8068 items=0 ppid=4848 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:53.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632616339393261343264626163343235386561633330343337356439 May 15 00:57:53.118000 audit: BPF prog-id=210 op=UNLOAD May 15 00:57:53.118000 audit: BPF prog-id=209 op=UNLOAD May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { perfmon } for pid=5049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit[5049]: AVC avc: denied { bpf } for pid=5049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:53.118000 audit: BPF prog-id=211 op=LOAD May 15 00:57:53.118000 audit[5049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d8478 items=0 ppid=4848 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:53.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632616339393261343264626163343235386561633330343337356439 May 15 00:57:53.142368 env[1201]: time="2025-05-15T00:57:53.142324699Z" level=info msg="StartContainer for \"f2ac992a42dbac4258eac304375d98089c9bb4dbfbf0840ffeeef430d34ac117\" returns successfully" May 15 00:57:53.414636 kubelet[1952]: E0515 00:57:53.414491 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:53.881227 kubelet[1952]: I0515 00:57:53.881139 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55fd84bbd9-6tkvx" podStartSLOduration=71.026072045 podStartE2EDuration="1m13.881119431s" podCreationTimestamp="2025-05-15 00:56:40 +0000 UTC" firstStartedPulling="2025-05-15 00:57:50.172894777 +0000 UTC m=+82.828768902" lastFinishedPulling="2025-05-15 00:57:53.027942153 +0000 UTC m=+85.683816288" observedRunningTime="2025-05-15 00:57:53.880820247 +0000 UTC m=+86.536694412" watchObservedRunningTime="2025-05-15 00:57:53.881119431 +0000 UTC m=+86.536993566" May 15 00:57:54.414830 env[1201]: time="2025-05-15T00:57:54.414757251Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\"" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.573 [INFO][5117] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.575 [INFO][5117] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" iface="eth0" netns="/var/run/netns/cni-ab065a52-6c8b-0119-e8ea-64408bc0f15e" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.576 [INFO][5117] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" iface="eth0" netns="/var/run/netns/cni-ab065a52-6c8b-0119-e8ea-64408bc0f15e" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.576 [INFO][5117] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" iface="eth0" netns="/var/run/netns/cni-ab065a52-6c8b-0119-e8ea-64408bc0f15e" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.576 [INFO][5117] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.576 [INFO][5117] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.603 [INFO][5125] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" HandleID="k8s-pod-network.4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" Workload="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.604 [INFO][5125] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.604 [INFO][5125] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.609 [WARNING][5125] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" HandleID="k8s-pod-network.4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" Workload="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.610 [INFO][5125] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" HandleID="k8s-pod-network.4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" Workload="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.611 [INFO][5125] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:54.614824 env[1201]: 2025-05-15 00:57:54.612 [INFO][5117] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322" May 15 00:57:54.615302 env[1201]: time="2025-05-15T00:57:54.615064768Z" level=info msg="TearDown network for sandbox \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" successfully" May 15 00:57:54.615302 env[1201]: time="2025-05-15T00:57:54.615105255Z" level=info msg="StopPodSandbox for \"4cef664e26a2780edd60d0d2a9780e2c92b1f8f0b7891a50919dfab3d6f18322\" returns successfully" May 15 00:57:54.615824 env[1201]: time="2025-05-15T00:57:54.615782681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-q6ptv,Uid:0a5535c4-986f-4643-a53c-ec6f9f2e8c64,Namespace:calico-apiserver,Attempt:1,}" May 15 00:57:54.618479 systemd[1]: run-netns-cni\x2dab065a52\x2d6c8b\x2d0119\x2de8ea\x2d64408bc0f15e.mount: Deactivated successfully. May 15 00:57:54.741072 systemd-networkd[1018]: calie3f26b31d27: Link UP May 15 00:57:54.742629 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:57:54.742692 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3f26b31d27: link becomes ready May 15 00:57:54.742794 systemd-networkd[1018]: calie3f26b31d27: Gained carrier May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.669 [INFO][5132] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0 calico-apiserver-59645c89cd- calico-apiserver 0a5535c4-986f-4643-a53c-ec6f9f2e8c64 1206 0 2025-05-15 00:56:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59645c89cd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-59645c89cd-q6ptv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie3f26b31d27 [] []}} ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.669 [INFO][5132] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.699 [INFO][5149] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" HandleID="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Workload="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.708 [INFO][5149] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" HandleID="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Workload="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000316320), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-59645c89cd-q6ptv", "timestamp":"2025-05-15 00:57:54.699469758 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.708 [INFO][5149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.708 [INFO][5149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.708 [INFO][5149] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.710 [INFO][5149] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.713 [INFO][5149] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.717 [INFO][5149] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.719 [INFO][5149] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.721 [INFO][5149] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.721 [INFO][5149] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.723 [INFO][5149] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.726 [INFO][5149] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.732 [INFO][5149] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.732 [INFO][5149] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" host="localhost" May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.732 [INFO][5149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:57:54.762260 env[1201]: 2025-05-15 00:57:54.732 [INFO][5149] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" HandleID="k8s-pod-network.5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Workload="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.762869 env[1201]: 2025-05-15 00:57:54.734 [INFO][5132] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0", GenerateName:"calico-apiserver-59645c89cd-", Namespace:"calico-apiserver", SelfLink:"", UID:"0a5535c4-986f-4643-a53c-ec6f9f2e8c64", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59645c89cd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-59645c89cd-q6ptv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3f26b31d27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:54.762869 env[1201]: 2025-05-15 00:57:54.734 [INFO][5132] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.762869 env[1201]: 2025-05-15 00:57:54.734 [INFO][5132] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie3f26b31d27 ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.762869 env[1201]: 2025-05-15 00:57:54.744 [INFO][5132] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.762869 env[1201]: 2025-05-15 00:57:54.745 [INFO][5132] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0", GenerateName:"calico-apiserver-59645c89cd-", Namespace:"calico-apiserver", SelfLink:"", UID:"0a5535c4-986f-4643-a53c-ec6f9f2e8c64", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 56, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59645c89cd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed", Pod:"calico-apiserver-59645c89cd-q6ptv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie3f26b31d27", MAC:"b2:4d:0c:07:b6:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:57:54.762869 env[1201]: 2025-05-15 00:57:54.755 [INFO][5132] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed" Namespace="calico-apiserver" Pod="calico-apiserver-59645c89cd-q6ptv" WorkloadEndpoint="localhost-k8s-calico--apiserver--59645c89cd--q6ptv-eth0" May 15 00:57:54.779000 audit[5179]: NETFILTER_CFG table=filter:118 family=2 entries=46 op=nft_register_chain pid=5179 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:57:54.779000 audit[5179]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffcd6463f90 a2=0 a3=7ffcd6463f7c items=0 ppid=4139 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:54.779000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:57:54.784305 env[1201]: time="2025-05-15T00:57:54.784226080Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:57:54.784416 env[1201]: time="2025-05-15T00:57:54.784322813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:57:54.784416 env[1201]: time="2025-05-15T00:57:54.784352558Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:57:54.784664 env[1201]: time="2025-05-15T00:57:54.784583043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed pid=5185 runtime=io.containerd.runc.v2 May 15 00:57:54.807893 systemd[1]: Started cri-containerd-5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed.scope. May 15 00:57:54.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit: BPF prog-id=212 op=LOAD May 15 00:57:54.821000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.821000 audit[5194]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=5185 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:54.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562366334616239353834313938366362323563383732633063316563 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=5185 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:54.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562366334616239353834313938366362323563383732633063316563 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.822000 audit: BPF prog-id=213 op=LOAD May 15 00:57:54.822000 audit[5194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00032dd10 items=0 ppid=5185 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:54.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562366334616239353834313938366362323563383732633063316563 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit: BPF prog-id=214 op=LOAD May 15 00:57:54.823000 audit[5194]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00032dd58 items=0 ppid=5185 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:54.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562366334616239353834313938366362323563383732633063316563 May 15 00:57:54.823000 audit: BPF prog-id=214 op=UNLOAD May 15 00:57:54.823000 audit: BPF prog-id=213 op=UNLOAD May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { perfmon } for pid=5194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit[5194]: AVC avc: denied { bpf } for pid=5194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:54.823000 audit: BPF prog-id=215 op=LOAD May 15 00:57:54.823000 audit[5194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003ae168 items=0 ppid=5185 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:54.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562366334616239353834313938366362323563383732633063316563 May 15 00:57:54.826040 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:57:54.849843 env[1201]: time="2025-05-15T00:57:54.849794465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59645c89cd-q6ptv,Uid:0a5535c4-986f-4643-a53c-ec6f9f2e8c64,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed\"" May 15 00:57:55.273061 kernel: kauditd_printk_skb: 293 callbacks suppressed May 15 00:57:55.273226 kernel: audit: type=1130 audit(1747270675.266:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:39350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:55.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:39350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:55.267250 systemd[1]: Started sshd@21-10.0.0.118:22-10.0.0.1:39350.service. May 15 00:57:55.314000 audit[5219]: USER_ACCT pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.336675 kernel: audit: type=1101 audit(1747270675.314:1490): pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.336793 kernel: audit: type=1103 audit(1747270675.319:1491): pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.336830 kernel: audit: type=1006 audit(1747270675.319:1492): pid=5219 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 00:57:55.336858 kernel: audit: type=1300 audit(1747270675.319:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d1b4cb0 a2=3 a3=0 items=0 ppid=1 pid=5219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.336896 kernel: audit: type=1327 audit(1747270675.319:1492): proctitle=737368643A20636F7265205B707269765D May 15 00:57:55.336923 kernel: audit: type=1105 audit(1747270675.328:1493): pid=5219 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.319000 audit[5219]: CRED_ACQ pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.319000 audit[5219]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d1b4cb0 a2=3 a3=0 items=0 ppid=1 pid=5219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:57:55.328000 audit[5219]: USER_START pid=5219 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.330000 audit[5221]: CRED_ACQ pid=5221 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.341736 sshd[5219]: Accepted publickey for core from 10.0.0.1 port 39350 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:57:55.342275 kernel: audit: type=1103 audit(1747270675.330:1494): pid=5221 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.324723 systemd-logind[1187]: New session 22 of user core. May 15 00:57:55.320310 sshd[5219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:57:55.325192 systemd[1]: Started session-22.scope. May 15 00:57:55.503291 sshd[5219]: pam_unix(sshd:session): session closed for user core May 15 00:57:55.503000 audit[5219]: USER_END pid=5219 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.509899 kernel: audit: type=1106 audit(1747270675.503:1495): pid=5219 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.506090 systemd[1]: sshd@21-10.0.0.118:22-10.0.0.1:39350.service: Deactivated successfully. May 15 00:57:55.507004 systemd[1]: session-22.scope: Deactivated successfully. May 15 00:57:55.507693 systemd-logind[1187]: Session 22 logged out. Waiting for processes to exit. May 15 00:57:55.508638 systemd-logind[1187]: Removed session 22. May 15 00:57:55.503000 audit[5219]: CRED_DISP pid=5219 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.514816 kernel: audit: type=1104 audit(1747270675.503:1496): pid=5219 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:57:55.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:39350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:57:55.767901 env[1201]: time="2025-05-15T00:57:55.767833291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:55.770296 env[1201]: time="2025-05-15T00:57:55.770262171Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:55.772260 env[1201]: time="2025-05-15T00:57:55.772214712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:55.774368 env[1201]: time="2025-05-15T00:57:55.774332535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:55.774991 env[1201]: time="2025-05-15T00:57:55.774950600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 00:57:55.776087 env[1201]: time="2025-05-15T00:57:55.776052718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 00:57:55.776988 env[1201]: time="2025-05-15T00:57:55.776906027Z" level=info msg="CreateContainer within sandbox \"6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 00:57:55.791802 env[1201]: time="2025-05-15T00:57:55.791343339Z" level=info msg="CreateContainer within sandbox \"6a9d7f62dda1a5d10007e1136056bb3df1159acfa26cab019c7c2c6a6b5bbc31\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c4de52c54a531553fb6909fac4214fe7e268673255d224d27b8630510dbaa90c\"" May 15 00:57:55.792045 env[1201]: time="2025-05-15T00:57:55.792018211Z" level=info msg="StartContainer for \"c4de52c54a531553fb6909fac4214fe7e268673255d224d27b8630510dbaa90c\"" May 15 00:57:55.811990 systemd[1]: Started cri-containerd-c4de52c54a531553fb6909fac4214fe7e268673255d224d27b8630510dbaa90c.scope. May 15 00:57:55.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit: BPF prog-id=216 op=LOAD May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4972 pid=5240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334646535326335346135333135353366623639303966616334323134 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4972 pid=5240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334646535326335346135333135353366623639303966616334323134 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit: BPF prog-id=217 op=LOAD May 15 00:57:55.822000 audit[5240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022a8e0 items=0 ppid=4972 pid=5240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334646535326335346135333135353366623639303966616334323134 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit: BPF prog-id=218 op=LOAD May 15 00:57:55.822000 audit[5240]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022a928 items=0 ppid=4972 pid=5240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334646535326335346135333135353366623639303966616334323134 May 15 00:57:55.822000 audit: BPF prog-id=218 op=UNLOAD May 15 00:57:55.822000 audit: BPF prog-id=217 op=UNLOAD May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { perfmon } for pid=5240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit[5240]: AVC avc: denied { bpf } for pid=5240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:55.822000 audit: BPF prog-id=219 op=LOAD May 15 00:57:55.822000 audit[5240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022ad38 items=0 ppid=4972 pid=5240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334646535326335346135333135353366623639303966616334323134 May 15 00:57:55.929138 env[1201]: time="2025-05-15T00:57:55.929066114Z" level=info msg="StartContainer for \"c4de52c54a531553fb6909fac4214fe7e268673255d224d27b8630510dbaa90c\" returns successfully" May 15 00:57:55.982000 audit[5273]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:55.982000 audit[5273]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd5ddc5b00 a2=0 a3=7ffd5ddc5aec items=0 ppid=2140 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:55.986000 audit[5273]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:55.986000 audit[5273]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd5ddc5b00 a2=0 a3=7ffd5ddc5aec items=0 ppid=2140 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:55.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:56.453000 audit[5251]: AVC avc: denied { watch } for pid=5251 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_00_56_53.47857771/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c837 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c594,c837 tclass=file permissive=0 May 15 00:57:56.453000 audit[5251]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d3c180 a2=fc6 a3=0 items=0 ppid=4972 pid=5251 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c837 key=(null) May 15 00:57:56.453000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 00:57:56.467023 systemd-networkd[1018]: calie3f26b31d27: Gained IPv6LL May 15 00:57:56.468921 kubelet[1952]: I0515 00:57:56.468865 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59645c89cd-hr7vc" podStartSLOduration=71.414936303 podStartE2EDuration="1m16.468845498s" podCreationTimestamp="2025-05-15 00:56:40 +0000 UTC" firstStartedPulling="2025-05-15 00:57:50.721931012 +0000 UTC m=+83.377805147" lastFinishedPulling="2025-05-15 00:57:55.775840197 +0000 UTC m=+88.431714342" observedRunningTime="2025-05-15 00:57:55.969155512 +0000 UTC m=+88.625029667" watchObservedRunningTime="2025-05-15 00:57:56.468845498 +0000 UTC m=+89.124719633" May 15 00:57:56.479000 audit[5275]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=5275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:56.479000 audit[5275]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe8ef950f0 a2=0 a3=7ffe8ef950dc items=0 ppid=2140 pid=5275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:56.485000 audit[5275]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=5275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:56.485000 audit[5275]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe8ef950f0 a2=0 a3=7ffe8ef950dc items=0 ppid=2140 pid=5275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:56.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:57.417017 kubelet[1952]: E0515 00:57:57.416969 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:57:57.700703 env[1201]: time="2025-05-15T00:57:57.700542427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:57.704987 env[1201]: time="2025-05-15T00:57:57.704854343Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:57.719847 env[1201]: time="2025-05-15T00:57:57.719790363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:57.776013 env[1201]: time="2025-05-15T00:57:57.775954099Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:57.776461 env[1201]: time="2025-05-15T00:57:57.776412885Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 00:57:57.777757 env[1201]: time="2025-05-15T00:57:57.777549719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 00:57:57.778659 env[1201]: time="2025-05-15T00:57:57.778615430Z" level=info msg="CreateContainer within sandbox \"3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 00:57:57.900333 env[1201]: time="2025-05-15T00:57:57.900277865Z" level=info msg="CreateContainer within sandbox \"3bf9ac3bcd603006dd0258ca0a744769feb01bc80993e938ba9ee77b7fd1eefa\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"54b3297d3eda7ce3d73d7d95422eba34a2b2c8b258c97dd09af00fffd6705af2\"" May 15 00:57:57.900863 env[1201]: time="2025-05-15T00:57:57.900828784Z" level=info msg="StartContainer for \"54b3297d3eda7ce3d73d7d95422eba34a2b2c8b258c97dd09af00fffd6705af2\"" May 15 00:57:57.926063 systemd[1]: Started cri-containerd-54b3297d3eda7ce3d73d7d95422eba34a2b2c8b258c97dd09af00fffd6705af2.scope. May 15 00:57:57.938000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1febfa2d18 items=0 ppid=4686 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:57.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623332393764336564613763653364373364376439353432326562 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.938000 audit: BPF prog-id=220 op=LOAD May 15 00:57:57.938000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002daae8 items=0 ppid=4686 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:57.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623332393764336564613763653364373364376439353432326562 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit: BPF prog-id=221 op=LOAD May 15 00:57:57.939000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002dab38 items=0 ppid=4686 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:57.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623332393764336564613763653364373364376439353432326562 May 15 00:57:57.939000 audit: BPF prog-id=221 op=UNLOAD May 15 00:57:57.939000 audit: BPF prog-id=220 op=UNLOAD May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:57.939000 audit: BPF prog-id=222 op=LOAD May 15 00:57:57.939000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002dabc8 items=0 ppid=4686 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:57.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623332393764336564613763653364373364376439353432326562 May 15 00:57:57.996715 env[1201]: time="2025-05-15T00:57:57.996577617Z" level=info msg="StartContainer for \"54b3297d3eda7ce3d73d7d95422eba34a2b2c8b258c97dd09af00fffd6705af2\" returns successfully" May 15 00:57:58.247234 env[1201]: time="2025-05-15T00:57:58.247095082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:58.248809 env[1201]: time="2025-05-15T00:57:58.248783569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:58.250426 env[1201]: time="2025-05-15T00:57:58.250377357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:58.251850 env[1201]: time="2025-05-15T00:57:58.251824208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:57:58.252258 env[1201]: time="2025-05-15T00:57:58.252237067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 00:57:58.254338 env[1201]: time="2025-05-15T00:57:58.254302004Z" level=info msg="CreateContainer within sandbox \"5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 00:57:58.267377 env[1201]: time="2025-05-15T00:57:58.267324853Z" level=info msg="CreateContainer within sandbox \"5b6c4ab95841986cb25c872c0c1ec2c672fd2a8065b8ad03c642a2bfa95732ed\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"db9a0b4ddd55192cd6890bd4a15e71806ec535ef16f4eb17108acf9bf7e62304\"" May 15 00:57:58.267860 env[1201]: time="2025-05-15T00:57:58.267739976Z" level=info msg="StartContainer for \"db9a0b4ddd55192cd6890bd4a15e71806ec535ef16f4eb17108acf9bf7e62304\"" May 15 00:57:58.282397 systemd[1]: Started cri-containerd-db9a0b4ddd55192cd6890bd4a15e71806ec535ef16f4eb17108acf9bf7e62304.scope. May 15 00:57:58.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.295000 audit: BPF prog-id=223 op=LOAD May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5185 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396130623464646435353139326364363839306264346131356537 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5185 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396130623464646435353139326364363839306264346131356537 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit: BPF prog-id=224 op=LOAD May 15 00:57:58.296000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003019a0 items=0 ppid=5185 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396130623464646435353139326364363839306264346131356537 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.296000 audit: BPF prog-id=225 op=LOAD May 15 00:57:58.296000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003019e8 items=0 ppid=5185 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396130623464646435353139326364363839306264346131356537 May 15 00:57:58.297000 audit: BPF prog-id=225 op=UNLOAD May 15 00:57:58.297000 audit: BPF prog-id=224 op=UNLOAD May 15 00:57:58.297000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:57:58.297000 audit: BPF prog-id=226 op=LOAD May 15 00:57:58.297000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000301df8 items=0 ppid=5185 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396130623464646435353139326364363839306264346131356537 May 15 00:57:58.323873 env[1201]: time="2025-05-15T00:57:58.323829265Z" level=info msg="StartContainer for \"db9a0b4ddd55192cd6890bd4a15e71806ec535ef16f4eb17108acf9bf7e62304\" returns successfully" May 15 00:57:58.735060 kubelet[1952]: I0515 00:57:58.735030 1952 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 00:57:58.735060 kubelet[1952]: I0515 00:57:58.735060 1952 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 00:57:58.968419 kubelet[1952]: I0515 00:57:58.968363 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8b5hz" podStartSLOduration=70.022790029 podStartE2EDuration="1m18.96834707s" podCreationTimestamp="2025-05-15 00:56:40 +0000 UTC" firstStartedPulling="2025-05-15 00:57:48.831820825 +0000 UTC m=+81.487694960" lastFinishedPulling="2025-05-15 00:57:57.777377706 +0000 UTC m=+90.433252001" observedRunningTime="2025-05-15 00:57:58.956450738 +0000 UTC m=+91.612324873" watchObservedRunningTime="2025-05-15 00:57:58.96834707 +0000 UTC m=+91.624221205" May 15 00:57:58.968633 kubelet[1952]: I0515 00:57:58.968601 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59645c89cd-q6ptv" podStartSLOduration=75.566635265 podStartE2EDuration="1m18.968596991s" podCreationTimestamp="2025-05-15 00:56:40 +0000 UTC" firstStartedPulling="2025-05-15 00:57:54.851034423 +0000 UTC m=+87.506908558" lastFinishedPulling="2025-05-15 00:57:58.252996149 +0000 UTC m=+90.908870284" observedRunningTime="2025-05-15 00:57:58.967089767 +0000 UTC m=+91.622963902" watchObservedRunningTime="2025-05-15 00:57:58.968596991 +0000 UTC m=+91.624471116" May 15 00:57:58.977000 audit[5355]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:58.977000 audit[5355]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe9141f9c0 a2=0 a3=7ffe9141f9ac items=0 ppid=2140 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:58.981000 audit[5355]: NETFILTER_CFG table=nat:124 family=2 entries=30 op=nft_register_rule pid=5355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:58.981000 audit[5355]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe9141f9c0 a2=0 a3=7ffe9141f9ac items=0 ppid=2140 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:58.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:59.266000 audit[5332]: AVC avc: denied { watch } for pid=5332 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_00_56_53.83487718/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c703,c801 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c703,c801 tclass=file permissive=0 May 15 00:57:59.266000 audit[5332]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000501c60 a2=fc6 a3=0 items=0 ppid=5185 pid=5332 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c703,c801 key=(null) May 15 00:57:59.266000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 00:57:59.287000 audit[5357]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:59.287000 audit[5357]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe1e83ac80 a2=0 a3=7ffe1e83ac6c items=0 ppid=2140 pid=5357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:59.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:59.296000 audit[5357]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=5357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:57:59.296000 audit[5357]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe1e83ac80 a2=0 a3=7ffe1e83ac6c items=0 ppid=2140 pid=5357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:57:59.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:57:59.415217 kubelet[1952]: E0515 00:57:59.415181 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:58:00.507035 systemd[1]: Started sshd@22-10.0.0.118:22-10.0.0.1:56260.service. May 15 00:58:00.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:56260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:00.508474 kernel: kauditd_printk_skb: 188 callbacks suppressed May 15 00:58:00.508558 kernel: audit: type=1130 audit(1747270680.506:1550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:56260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:00.550000 audit[5361]: USER_ACCT pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.551427 sshd[5361]: Accepted publickey for core from 10.0.0.1 port 56260 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:00.554000 audit[5361]: CRED_ACQ pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.555757 sshd[5361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:00.571966 kernel: audit: type=1101 audit(1747270680.550:1551): pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.572019 kernel: audit: type=1103 audit(1747270680.554:1552): pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.572039 kernel: audit: type=1006 audit(1747270680.554:1553): pid=5361 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 00:58:00.572056 kernel: audit: type=1300 audit(1747270680.554:1553): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc58eed50 a2=3 a3=0 items=0 ppid=1 pid=5361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:00.572078 kernel: audit: type=1327 audit(1747270680.554:1553): proctitle=737368643A20636F7265205B707269765D May 15 00:58:00.572095 kernel: audit: type=1105 audit(1747270680.563:1554): pid=5361 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.572112 kernel: audit: type=1103 audit(1747270680.564:1555): pid=5363 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.554000 audit[5361]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc58eed50 a2=3 a3=0 items=0 ppid=1 pid=5361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:00.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:00.563000 audit[5361]: USER_START pid=5361 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.564000 audit[5363]: CRED_ACQ pid=5363 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.559913 systemd[1]: Started session-23.scope. May 15 00:58:00.559967 systemd-logind[1187]: New session 23 of user core. May 15 00:58:00.708421 sshd[5361]: pam_unix(sshd:session): session closed for user core May 15 00:58:00.708000 audit[5361]: USER_END pid=5361 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.712267 systemd[1]: sshd@22-10.0.0.118:22-10.0.0.1:56260.service: Deactivated successfully. May 15 00:58:00.712739 systemd[1]: session-23.scope: Deactivated successfully. May 15 00:58:00.713254 systemd-logind[1187]: Session 23 logged out. Waiting for processes to exit. May 15 00:58:00.708000 audit[5361]: CRED_DISP pid=5361 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.714683 systemd[1]: Started sshd@23-10.0.0.118:22-10.0.0.1:56264.service. May 15 00:58:00.715480 systemd-logind[1187]: Removed session 23. May 15 00:58:00.717260 kernel: audit: type=1106 audit(1747270680.708:1556): pid=5361 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.717310 kernel: audit: type=1104 audit(1747270680.708:1557): pid=5361 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:56260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:00.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.118:22-10.0.0.1:56264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:00.753000 audit[5375]: USER_ACCT pid=5375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.754442 sshd[5375]: Accepted publickey for core from 10.0.0.1 port 56264 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:00.754000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.754000 audit[5375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6369420 a2=3 a3=0 items=0 ppid=1 pid=5375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:00.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:00.755460 sshd[5375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:00.758824 systemd-logind[1187]: New session 24 of user core. May 15 00:58:00.759828 systemd[1]: Started session-24.scope. May 15 00:58:00.763000 audit[5375]: USER_START pid=5375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:00.764000 audit[5377]: CRED_ACQ pid=5377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.210860 sshd[5375]: pam_unix(sshd:session): session closed for user core May 15 00:58:01.211000 audit[5375]: USER_END pid=5375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.211000 audit[5375]: CRED_DISP pid=5375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.214395 systemd[1]: Started sshd@24-10.0.0.118:22-10.0.0.1:56276.service. May 15 00:58:01.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.118:22-10.0.0.1:56276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:01.214850 systemd[1]: sshd@23-10.0.0.118:22-10.0.0.1:56264.service: Deactivated successfully. May 15 00:58:01.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.118:22-10.0.0.1:56264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:01.215346 systemd[1]: session-24.scope: Deactivated successfully. May 15 00:58:01.215949 systemd-logind[1187]: Session 24 logged out. Waiting for processes to exit. May 15 00:58:01.217906 systemd-logind[1187]: Removed session 24. May 15 00:58:01.255000 audit[5386]: USER_ACCT pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.256680 sshd[5386]: Accepted publickey for core from 10.0.0.1 port 56276 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:01.256000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.256000 audit[5386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff90165710 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:01.256000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:01.257645 sshd[5386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:01.260885 systemd-logind[1187]: New session 25 of user core. May 15 00:58:01.261592 systemd[1]: Started session-25.scope. May 15 00:58:01.264000 audit[5386]: USER_START pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.265000 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:01.415109 kubelet[1952]: E0515 00:58:01.415075 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:58:02.071000 audit[5402]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.071000 audit[5402]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffee7b31290 a2=0 a3=7ffee7b3127c items=0 ppid=2140 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.078000 audit[5402]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.078000 audit[5402]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee7b31290 a2=0 a3=0 items=0 ppid=2140 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.080782 sshd[5386]: pam_unix(sshd:session): session closed for user core May 15 00:58:02.080000 audit[5386]: USER_END pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.081000 audit[5386]: CRED_DISP pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.083046 systemd[1]: sshd@24-10.0.0.118:22-10.0.0.1:56276.service: Deactivated successfully. May 15 00:58:02.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.118:22-10.0.0.1:56276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:02.083512 systemd[1]: session-25.scope: Deactivated successfully. May 15 00:58:02.084057 systemd-logind[1187]: Session 25 logged out. Waiting for processes to exit. May 15 00:58:02.084965 systemd[1]: Started sshd@25-10.0.0.118:22-10.0.0.1:56292.service. May 15 00:58:02.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.118:22-10.0.0.1:56292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:02.086062 systemd-logind[1187]: Removed session 25. May 15 00:58:02.090000 audit[5407]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=5407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.090000 audit[5407]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc08945a00 a2=0 a3=7ffc089459ec items=0 ppid=2140 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.095000 audit[5407]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=5407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:02.095000 audit[5407]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc08945a00 a2=0 a3=0 items=0 ppid=2140 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:02.126000 audit[5405]: USER_ACCT pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.127270 sshd[5405]: Accepted publickey for core from 10.0.0.1 port 56292 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:02.127000 audit[5405]: CRED_ACQ pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.127000 audit[5405]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc63f71650 a2=3 a3=0 items=0 ppid=1 pid=5405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.127000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:02.128514 sshd[5405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:02.132200 systemd-logind[1187]: New session 26 of user core. May 15 00:58:02.133165 systemd[1]: Started session-26.scope. May 15 00:58:02.137000 audit[5405]: USER_START pid=5405 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.138000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.387379 sshd[5405]: pam_unix(sshd:session): session closed for user core May 15 00:58:02.388000 audit[5405]: USER_END pid=5405 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.388000 audit[5405]: CRED_DISP pid=5405 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.118:22-10.0.0.1:56292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:02.390259 systemd[1]: sshd@25-10.0.0.118:22-10.0.0.1:56292.service: Deactivated successfully. May 15 00:58:02.390841 systemd[1]: session-26.scope: Deactivated successfully. May 15 00:58:02.391444 systemd-logind[1187]: Session 26 logged out. Waiting for processes to exit. May 15 00:58:02.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.118:22-10.0.0.1:56298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:02.392588 systemd[1]: Started sshd@26-10.0.0.118:22-10.0.0.1:56298.service. May 15 00:58:02.395021 systemd-logind[1187]: Removed session 26. May 15 00:58:02.431000 audit[5418]: USER_ACCT pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.433003 sshd[5418]: Accepted publickey for core from 10.0.0.1 port 56298 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:02.432000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.432000 audit[5418]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcea91e6a0 a2=3 a3=0 items=0 ppid=1 pid=5418 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:02.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:02.433896 sshd[5418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:02.437510 systemd-logind[1187]: New session 27 of user core. May 15 00:58:02.438070 systemd[1]: Started session-27.scope. May 15 00:58:02.440000 audit[5418]: USER_START pid=5418 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.441000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.554388 sshd[5418]: pam_unix(sshd:session): session closed for user core May 15 00:58:02.554000 audit[5418]: USER_END pid=5418 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.554000 audit[5418]: CRED_DISP pid=5418 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:02.556655 systemd[1]: sshd@26-10.0.0.118:22-10.0.0.1:56298.service: Deactivated successfully. May 15 00:58:02.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.118:22-10.0.0.1:56298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:02.557362 systemd[1]: session-27.scope: Deactivated successfully. May 15 00:58:02.557809 systemd-logind[1187]: Session 27 logged out. Waiting for processes to exit. May 15 00:58:02.558423 systemd-logind[1187]: Removed session 27. May 15 00:58:07.558236 systemd[1]: Started sshd@27-10.0.0.118:22-10.0.0.1:54334.service. May 15 00:58:07.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.118:22-10.0.0.1:54334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:07.562791 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 00:58:07.562867 kernel: audit: type=1130 audit(1747270687.557:1599): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.118:22-10.0.0.1:54334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:07.599000 audit[5462]: USER_ACCT pid=5462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.600669 sshd[5462]: Accepted publickey for core from 10.0.0.1 port 54334 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:07.604000 audit[5462]: CRED_ACQ pid=5462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.605310 sshd[5462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:07.608612 systemd-logind[1187]: New session 28 of user core. May 15 00:58:07.609452 kernel: audit: type=1101 audit(1747270687.599:1600): pid=5462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.609501 kernel: audit: type=1103 audit(1747270687.604:1601): pid=5462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.609537 kernel: audit: type=1006 audit(1747270687.604:1602): pid=5462 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 15 00:58:07.609561 systemd[1]: Started session-28.scope. May 15 00:58:07.604000 audit[5462]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdd75d810 a2=3 a3=0 items=0 ppid=1 pid=5462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.617454 kernel: audit: type=1300 audit(1747270687.604:1602): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdd75d810 a2=3 a3=0 items=0 ppid=1 pid=5462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:07.617502 kernel: audit: type=1327 audit(1747270687.604:1602): proctitle=737368643A20636F7265205B707269765D May 15 00:58:07.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:07.613000 audit[5462]: USER_START pid=5462 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.623338 kernel: audit: type=1105 audit(1747270687.613:1603): pid=5462 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.623382 kernel: audit: type=1103 audit(1747270687.614:1604): pid=5464 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.614000 audit[5464]: CRED_ACQ pid=5464 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.715413 sshd[5462]: pam_unix(sshd:session): session closed for user core May 15 00:58:07.715000 audit[5462]: USER_END pid=5462 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.717195 systemd[1]: sshd@27-10.0.0.118:22-10.0.0.1:54334.service: Deactivated successfully. May 15 00:58:07.718004 systemd[1]: session-28.scope: Deactivated successfully. May 15 00:58:07.718533 systemd-logind[1187]: Session 28 logged out. Waiting for processes to exit. May 15 00:58:07.719285 systemd-logind[1187]: Removed session 28. May 15 00:58:07.715000 audit[5462]: CRED_DISP pid=5462 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.723925 kernel: audit: type=1106 audit(1747270687.715:1605): pid=5462 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.723972 kernel: audit: type=1104 audit(1747270687.715:1606): pid=5462 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:07.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.118:22-10.0.0.1:54334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:08.190000 audit[5478]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:08.190000 audit[5478]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff136c2020 a2=0 a3=7fff136c200c items=0 ppid=2140 pid=5478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:08.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:08.196000 audit[5478]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=5478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:58:08.196000 audit[5478]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff136c2020 a2=0 a3=7fff136c200c items=0 ppid=2140 pid=5478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:08.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:58:12.719944 systemd[1]: Started sshd@28-10.0.0.118:22-10.0.0.1:54336.service. May 15 00:58:12.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.118:22-10.0.0.1:54336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:12.721060 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 00:58:12.721111 kernel: audit: type=1130 audit(1747270692.719:1610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.118:22-10.0.0.1:54336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:12.760000 audit[5480]: USER_ACCT pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.761078 sshd[5480]: Accepted publickey for core from 10.0.0.1 port 54336 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:12.763455 sshd[5480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:12.762000 audit[5480]: CRED_ACQ pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.767932 systemd-logind[1187]: New session 29 of user core. May 15 00:58:12.768924 systemd[1]: Started session-29.scope. May 15 00:58:12.769618 kernel: audit: type=1101 audit(1747270692.760:1611): pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.769667 kernel: audit: type=1103 audit(1747270692.762:1612): pid=5480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.769684 kernel: audit: type=1006 audit(1747270692.762:1613): pid=5480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 15 00:58:12.762000 audit[5480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb25b4850 a2=3 a3=0 items=0 ppid=1 pid=5480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:12.776810 kernel: audit: type=1300 audit(1747270692.762:1613): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb25b4850 a2=3 a3=0 items=0 ppid=1 pid=5480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:12.777198 kernel: audit: type=1327 audit(1747270692.762:1613): proctitle=737368643A20636F7265205B707269765D May 15 00:58:12.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:12.773000 audit[5480]: USER_START pid=5480 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.784497 kernel: audit: type=1105 audit(1747270692.773:1614): pid=5480 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.784619 kernel: audit: type=1103 audit(1747270692.775:1615): pid=5482 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.775000 audit[5482]: CRED_ACQ pid=5482 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.884218 sshd[5480]: pam_unix(sshd:session): session closed for user core May 15 00:58:12.884000 audit[5480]: USER_END pid=5480 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.887052 systemd[1]: sshd@28-10.0.0.118:22-10.0.0.1:54336.service: Deactivated successfully. May 15 00:58:12.887724 systemd[1]: session-29.scope: Deactivated successfully. May 15 00:58:12.888557 systemd-logind[1187]: Session 29 logged out. Waiting for processes to exit. May 15 00:58:12.889217 systemd-logind[1187]: Removed session 29. May 15 00:58:12.884000 audit[5480]: CRED_DISP pid=5480 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.893137 kernel: audit: type=1106 audit(1747270692.884:1616): pid=5480 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.893191 kernel: audit: type=1104 audit(1747270692.884:1617): pid=5480 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:12.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.118:22-10.0.0.1:54336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:14.860107 kubelet[1952]: E0515 00:58:14.860074 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:58:17.888443 systemd[1]: Started sshd@29-10.0.0.118:22-10.0.0.1:57042.service. May 15 00:58:17.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.118:22-10.0.0.1:57042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:17.889501 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:58:17.889626 kernel: audit: type=1130 audit(1747270697.887:1619): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.118:22-10.0.0.1:57042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:17.932000 audit[5519]: USER_ACCT pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.934022 sshd[5519]: Accepted publickey for core from 10.0.0.1 port 57042 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:17.937813 kernel: audit: type=1101 audit(1747270697.932:1620): pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.937946 kernel: audit: type=1103 audit(1747270697.937:1621): pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.937000 audit[5519]: CRED_ACQ pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.938441 sshd[5519]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:17.942838 systemd-logind[1187]: New session 30 of user core. May 15 00:58:17.943782 systemd[1]: Started session-30.scope. May 15 00:58:17.944964 kernel: audit: type=1006 audit(1747270697.937:1622): pid=5519 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 15 00:58:17.945014 kernel: audit: type=1300 audit(1747270697.937:1622): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc42c89db0 a2=3 a3=0 items=0 ppid=1 pid=5519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:17.937000 audit[5519]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc42c89db0 a2=3 a3=0 items=0 ppid=1 pid=5519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:17.950059 kernel: audit: type=1327 audit(1747270697.937:1622): proctitle=737368643A20636F7265205B707269765D May 15 00:58:17.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:17.953046 kernel: audit: type=1105 audit(1747270697.950:1623): pid=5519 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.950000 audit[5519]: USER_START pid=5519 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.951000 audit[5524]: CRED_ACQ pid=5524 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:17.961463 kernel: audit: type=1103 audit(1747270697.951:1624): pid=5524 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:18.108958 sshd[5519]: pam_unix(sshd:session): session closed for user core May 15 00:58:18.109000 audit[5519]: USER_END pid=5519 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:18.112500 systemd[1]: sshd@29-10.0.0.118:22-10.0.0.1:57042.service: Deactivated successfully. May 15 00:58:18.113207 systemd[1]: session-30.scope: Deactivated successfully. May 15 00:58:18.113830 systemd-logind[1187]: Session 30 logged out. Waiting for processes to exit. May 15 00:58:18.114586 systemd-logind[1187]: Removed session 30. May 15 00:58:18.109000 audit[5519]: CRED_DISP pid=5519 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:18.118434 kernel: audit: type=1106 audit(1747270698.109:1625): pid=5519 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:18.118482 kernel: audit: type=1104 audit(1747270698.109:1626): pid=5519 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:18.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.118:22-10.0.0.1:57042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:21.416189 kubelet[1952]: E0515 00:58:21.416152 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:58:23.114259 systemd[1]: Started sshd@30-10.0.0.118:22-10.0.0.1:57048.service. May 15 00:58:23.127938 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:58:23.127974 kernel: audit: type=1130 audit(1747270703.113:1628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.118:22-10.0.0.1:57048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:23.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.118:22-10.0.0.1:57048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:23.155000 audit[5535]: USER_ACCT pid=5535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.156588 sshd[5535]: Accepted publickey for core from 10.0.0.1 port 57048 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:58:23.158370 sshd[5535]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:58:23.157000 audit[5535]: CRED_ACQ pid=5535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.162018 systemd-logind[1187]: New session 31 of user core. May 15 00:58:23.163056 systemd[1]: Started session-31.scope. May 15 00:58:23.165525 kernel: audit: type=1101 audit(1747270703.155:1629): pid=5535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.165588 kernel: audit: type=1103 audit(1747270703.157:1630): pid=5535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.165749 kernel: audit: type=1006 audit(1747270703.157:1631): pid=5535 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 May 15 00:58:23.168235 kernel: audit: type=1300 audit(1747270703.157:1631): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4bbd4be0 a2=3 a3=0 items=0 ppid=1 pid=5535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:23.157000 audit[5535]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4bbd4be0 a2=3 a3=0 items=0 ppid=1 pid=5535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:58:23.157000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:58:23.174622 kernel: audit: type=1327 audit(1747270703.157:1631): proctitle=737368643A20636F7265205B707269765D May 15 00:58:23.174674 kernel: audit: type=1105 audit(1747270703.167:1632): pid=5535 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.167000 audit[5535]: USER_START pid=5535 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.168000 audit[5537]: CRED_ACQ pid=5537 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.183051 kernel: audit: type=1103 audit(1747270703.168:1633): pid=5537 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.312002 sshd[5535]: pam_unix(sshd:session): session closed for user core May 15 00:58:23.311000 audit[5535]: USER_END pid=5535 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.316425 systemd[1]: sshd@30-10.0.0.118:22-10.0.0.1:57048.service: Deactivated successfully. May 15 00:58:23.317150 systemd[1]: session-31.scope: Deactivated successfully. May 15 00:58:23.314000 audit[5535]: CRED_DISP pid=5535 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.317851 systemd-logind[1187]: Session 31 logged out. Waiting for processes to exit. May 15 00:58:23.318641 systemd-logind[1187]: Removed session 31. May 15 00:58:23.320893 kernel: audit: type=1106 audit(1747270703.311:1634): pid=5535 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.320944 kernel: audit: type=1104 audit(1747270703.314:1635): pid=5535 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:58:23.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.118:22-10.0.0.1:57048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:58:24.885000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:24.885000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f4cc840 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:58:24.885000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:58:24.901000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:24.901000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c003d8d710 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:58:24.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:58:24.908000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:24.908000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f5120f0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:58:24.908000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:58:24.908000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:24.908000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00e112d00 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:58:24.908000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:58:24.919000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:24.919000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00e112d20 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:58:24.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:58:24.919000 audit[1836]: AVC avc: denied { watch } for pid=1836 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:24.919000 audit[1836]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f4cd4a0 a2=fc6 a3=0 items=0 ppid=1665 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c828 key=(null) May 15 00:58:24.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 00:58:25.177000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:25.177000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001411a40 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:58:25.177000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:58:25.177000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:58:25.177000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002367a40 a2=fc6 a3=0 items=0 ppid=1649 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c898 key=(null) May 15 00:58:25.177000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269